Training
Certifications
Books
Special Offers
Community




 
Microsoft® Windows® 2000 and IIS 5.0 Administrator's Pocket Consultant
Author William R. Stanek
Pages 396
Disk N/A
Level All Levels
Published 04/04/2001
ISBN 9780735610248
ISBN-10 0-7356-1024-X
Price(USD) $29.99
To see this book's discounted price, select a reseller below.
 

More Information

About the Book
Table of Contents
Sample Chapter
Index
Related Series
Related Books
About the Author

Support: Book & CD

Rate this book
Barnes Noble Amazon Quantum Books

 

Index


A
access logs
   error detection/resolution, 280–281
   formats of, 310
   Microsoft IIS log file format, 314–316, 323–325
   NCSA common log file format, 310–314, 322–323
   ODBC log file format, 319–320, 327–330
   overview of, 279
   W3C extended log file format, 316–319, 325–326
access permissions. See file and folder permissions
Access tab, Internet Information Services snap-in, 234–235
account lockout policies, guidelines for, 123
Active Directory Services Interface (ADSI)
   managing IIS with, 13
   manipulating IIS administrative objects, 348
Active Server Pages (ASPs). See Microsoft Active Server Pages (ASPs)
Add Counters dialog box, 288–289
administration techniques, 11–15
   using IIS administration objects, 13
   using IIS administration scripts, 13–14
   using IIS snap-in, 11
   using Internet Services Manager, 12
administrative tools
   Administrative Tools menu, 9–10
   installing, 10–11
   quick reference for, 10
   resource management with, 9–10
Administrative Tools menu, 9–10, 290
Administrator account, renaming for added security, 142
ADSI. See Active Directory Services Interface (ADSI)
Alert dialog box, 295–296
alerts, configuring, 295–297
alias domains, SMTP
   creating, 225
   renaming/deleting service domains, 233
Anonymous Access, log on process and, 114
anonymous authentication
   authentication modes and, 134
   SMTP, 236, 239
anonymous connections, FTP, 190, 206–208
application mappings, 82–85
   adding, 83–85
   components of, 78
   editing, 85
   removing, 85, 147
Application Protection
   ASP applications and, 3–4
   settings for, 82
applications
   advanced settings for, 76
   basic settings for, 76
   creating, 76–77
   creating pooled and nonpooled applications, 80–82
   deleting, 90
   enabling/disabling debugging, 88–89
   isolated, 89–90
   managing buffering for, 87
   managing session state for, 86
   overhead of, 79
   protection settings for, 77–78
   removing unnecessary, 333–334
   uploading, 89–90
   using and running, 77–80
applications, custom. See Microsoft Internet Information Services (IIS), custom applications
architecture, IIS, 17–18
ASCII
   log file formats and, 310, 314
   splitting and combining log files and, 321
auditing policies
   guidelines for, 123
   setting, 125–126
Audit Policy node, 126
authentication
   application components and, 78
   digest authentication and, 4
   enabling/disabling, 135–137
   FTP, 190–191
   modes of, 134
   process of, 134–135
   SMTP, 231–232, 236–237, 239
   understanding enhancements for, 8
Authentication Methods dialog box, 136
automatic restarts, IIS, 338–339

B
backup and recovery, 33–37
   certificate authorities (CAs) and, 160–162
   configuring, 32–33
   creating backup configurations, 35
   deleting backup configurations, 37
   rebuilding corrupted IIS installation, 36–37
   recovery options, 34
   restoring from backup config-urations, 36
   storing IIS Server configuration, 33–35
   using backup configurations, 34
Badmail folder, SMTP, 217, 223, 243
bandwidth
   configuring throttling, 305–306
   counters for, 286
   tuning and monitoring for Web servers, 304–307
baselines, for performance monitoring, 278
basic authentication, 134, 236, 239–240
bottlenecks. See performance bottlenecks
browser redirection, 63–69
   customizing, 67–69
   FTP sites and, 202
   IIS redirect variables, 68
   redirecting all requests, 65
   redirecting requests to other applications, 66–67
   redirecting requests to other directories or Web sites, 64
   retrieving files from a network share, 65–66
browsers
   accessing Microsoft Certificate Services, 158–159
   browsing Web site files, 62
   disabling directory browsing, 143
   File Not Found error and, 61
   preventing caching, 94
   support for host headers, 45–46
buffering, managing, 87

C
caching
   counters for, 286
   Indexing Service property cache, 256
   managing in IIS, 82–85
   optimizing in IIS, 337–338
   preventing browser caching, 94
   tracking for Web servers, 299–300
CAs. See certificate authorities (CAs)
catalogs, 253–254, 268–273
   adding physical directories to, 268–269
   building, 255, 256
   default catalogs, 254
   full/incremental directories rescans, 270
   merging, 271
   searching, 258–259
   specifying Web/NNTP sites to include in, 271–272
   starting, stopping, and pausing, 270–271
   testing with queries, 272–273
   viewing and creating, 261
   viewing properties and directories, 268
central processing units (CPUs), 5
CertControl, 158
CertEnroll, 158
certificate authorities (CAs), 159–160
   adding to client browser root store, 177–178
   backing up, 160–161
   defined, 151–152
   installing, 156–157
   restoring, 162
   reviewing/renewing root CA certificate, 165–166
   SMTP incoming connections and, 235–236
   third-party, 152–153
   types of, 154
Certificate dialog box, 165, 181–182
Certificate Export Wizard, 163, 183
certificate requests
   approving/declining, 163
   creating, 167–170
   deleting pending requests, 175
   processing pending requests, 174
   submitting to Certificate Services, 172–174
   submitting to third-party authorities, 170–171
certificates, 151–153. See also Microsoft Certificate Services
   client vs. server certificates, 151
   defined, 151
   exporting site certificates, 183–184
   generating manually, 163
   ignoring, accepting, and requiring, 184–185
   renewing, removing, and replacing, 182–183
   revoking, 164
   using with virtual servers, 236
   viewing and modifying, 180–182
Certificate Services. See Microsoft Certificate Services
Certification Authority snap-in
   controlling certificates with, 154
   Issued Certificates node of, 163
   nodes of, 154–155
   Pending Requests node of, 163
   Revoked Certificates node of, 164
   starting/stopping Certificate Services with, 159–160
CertSrv, 158
CGI. See Common Gateway Interface (CGI)
change notifications, rescans and, 270
common files, IIS components, 6
Common Gateway Interface (CGI)
   application mappings and, 147
   dynamic content and, 335
common log format. See National Center for Supercomputing Applications (NCSA) common log file format
components, installing, 6–8
Component Services snap-in
   managing authentication, 78
   managing COM components, 75
   managing Web application accounts, 115–116
compression, HTTP compression, 3, 306–307
Computer Management console
   accessing IIS snap-in from, 22–23
   catalogs, adding directories to, 269
   catalogs, creating, 261
   catalogs, managing, 270–271
   catalogs, merging, 271
   catalogs, specifying Web/NNTP sites to include in, 271–272
   catalogs, testing with queries, 272–273
   configuring IIS automatic restarts, 338–339
   configuring service startup, 31–32
   forcing full and incremental directory rescans, 270
   Indexing Service, managing, 263
   Indexing Service, node for, 253–254
   Indexing Service, optimizing, 266
   Indexing Service, setting properties, 264–265
   Indexing Service, viewing status conditions, 263
   Services node of, 29
computer names, checking, 46–48
configuration backups
   creating, 35
   deleting, 37
   restoring from, 36
   uses of, 34
connection limits
   configuring, 305–306
   setting for FTP, 199–200
   setting for SMTP, 238–239
connections
   controlling incoming, 56–57
   counters for, 286–287
   IIS summary, 23
   tuning and monitoring for Web servers, 304–307
connections, SMTP incoming
   controlling authentication of, 236–237
   securing access to, 234–235
   security of, 235–236
   setting connection restrictions and time-outs, 238–239
connections, SMTP outgoing
   configuring message limits, 241–242
   configuring security, 239–240
   controlling, 240–241
   relay restrictions, 243–244
   troubleshooting, 243
Connections dialog box, 238–239
content
   analyzing hard drive organization of, 335
   enabling/disabling expiration limits, 94–95
   optimizing usage in IIS, 334–336
   static vs. dynamic, 334–335
   using ratings for, 96–97
CONVLOG tool, 310
core services, IIS, 30
counter logs
   creating, 290–293
   overview of, 289
counters
   for IIS, 285
   monitoring server performance, 285–288
   in Performance Monitor, 284–289
CSCRIPT.EXE, 15

D
data protection, using RAID for, 5
Data Source Names (DSNs)
   configuring for ODBC logging, 319
   creating for SQL Server 2000, 328–330
data throughput. See throughput
dead ends, preventing, 109
debugging, enabling/disabling, 88
delay notification, SMTP, 245–246
delivery. See message delivery, SMTP
Delivery tab, SMTP options, 246
Desired Performance dialog box, 267
digest authentication
   IIS authentication methods, 4
   overview of, 134
directories
   creating top level, 51
   disabling browsing, 143
   forcing full and incremental rescans, 270
   Microsoft Windows 2000 file and directory structure, 17
   setting defaults for, 41
   setting listing style for FTP sites, 202
   viewing with Indexing Services, 268
directories, Web sites
   configuring system directories, 60–61
   creating physical directories, 59
   creating virtual directories, 59–60
   deleting, 62
   modifying properties, 61
   physical and virtual directory structures, 58–59
   renaming, 61
Directory Properties dialog box, 41
disk drives
   optimizing, 335
   requirements for Internet servers, 5
disk I/O, tuning and monitoring for Web servers, 303
disk mirroring (RAID 1), 5
disk striping without parity (RAID 0), 5
disk striping with parity (RAID 5), 5
distributed authoring and versioning. See Web Distributed Authoring and Versioning (WebDAV)
DLLHOST.EXE, 89
DLLs. See dynamic-link libraries (DLLs)
DNS (Domain Name System), 42
documentation
   IIS component installation, 6
   IISHelp, 60–61
documents
   accessing and publishing with WebDAV, 133
   configuring default documents, 92–93
   configuring footers for, 93–94
   types indexed, 252
domain names. See also fully qualified domain names (FQDNs)
   FTP security and, 213
   IIS security and, 137–139
   InterNIC and, 42
   setting options, 247–248
Domain Name System (DNS), 42
domains. See also service domains, SMTP
   changing domain information, 47
   default domains, SMTP, 226
   securing virtual server access by, 234–235
   specifying with URLs, 19–20
Drop directory, SMTP, 226–227
Drop folder, SMTP, 223
DSNs. See Data Source Names (DSNs)
dynamic-link libraries (DLLs)
   hosts, 18–19
   ISAPI extensions, 73
   ISAPI filters, 72–73

E
e-mail domains, 216. See also service domains
encryption, 149–151
   defined, 149
   strength of, 153
   TLS encryption, 232
enterprise root CA, 154, 156
enterprise subordinate CA, 154, 156
Error Mapping Properties dialog box, 102
error messages, 98–102
   configuring, 89
   editing custom settings, 102
   error handling options, 100
   handling 404 errors and preventing dead ends, 109
   standard HTTP error codes, 99
   status codes and, 98
   viewing custom settings, 101
errors
   404 errors, 109, 280
   counters for, 287
   detection/resolution, 279–284
   detection/resolution, access logs, 280–281
   detection/resolution, events logs, 281–284
   File Not Found error, 61
   filters for, 283–284
escape codes, URLs, 22
event logs, 279, 281–284
Event Viewer, 281–284
   event types and, 282
   filtering for warnings and errors, 283–284
   summary event information, 283
exit messages, FTP, 203
expiration time-out, SMTP, 245–246
extended logging, 309. See also World Wide Web Consortium (W3C) log file format
extensions, ISAPI, 73

F
fields
   Microsoft IIS log file format, 315–316
   NCSA common log file format, 312–314
   ODBC log file format, 320
   W3C extended log file format, 318–319
file and folder permissions
   guidelines based on content type, 118
   list of, 117
   overview, 117–118
   setting, 119–121
   viewing, 119
File Not Found error, 61
files, Web sites
   deleting, 63
   modifying properties, 62–63
   opening and browsing, 62
   renaming, 63
File Transfer Protocol (FTP)
   bundled with IIS, 3
   controlling server access, 190–191
   enabling logging, 309
   functions of, 189
   installing FTP service, 6
   overview, 189–190
   publishing service, 8–9
   sites, creating, 194–196
   sites, installing default, 7
   sites, using Microsoft IIS log file format, 323–325
   sites, using ODBC log file format, 327
   sites, using W3C log file format, 325–326
   sites, naming and identifying, 193–194
   working with FTP sessions, 191–193
File Transfer Protocol (FTP), security management, 205–213. See also security, Web servers
   configuring IP address and domain name restrictions, 210–212
   configuring Server permissions, globally, 209
   configuring Server permissions, locally, 210
   configuring site operators, 213
   configuring Windows permissions, 208
   managing anonymous connections, 206–208
File Transfer Protocol (FTP), session management, 203–205
   terminating users sessions, 204–205
   viewing number of connected users, 204–205
   viewing users sessions, 203–204
File Transfer Protocol (FTP), site management, 196–203
   configuring home directory, 197–198
   configuring ports and IP addresses, 198–199
   creating physical directories, 200–201
   creating virtual directories, 201
   redirecting requests, 202
   setting connection limits/time-out values, 199–200
   setting directory listing style, 202
   welcome, exit, and maximum connection messages, 202–203
File Types dialog box, 105–106
filters
   filtering event logs for warnings and errors, 283–284
   indexing process and, 256
   ISAPI filters, 72–73
   ISAPI filters, global, 90–91
   ISAPI filters, local, 91–92
FIND command, searching for errors, 281
firewalls, 142
folders. See file and folder permissions
footers, configuring for documents, 93–94
forms, checking for malicious input, 146
FQDNs. See fully qualified domain names (FQDNs)
FrontPage 2000 Server, 6
FTP. See File Transfer Protocol (FTP)
FTP Restart, 3
FTP Service Master Properties dialog box, 189
FTP Site Creation Wizard, 196
fully qualified domain names (FQDNs). See also domain names
   FTP sites, 189
   SMTP virtual servers, 247

G
group accounts. See user and group accounts
group permissions. See permissions
group policies
   configuring with Group Policy snap-in, 121–122
   guidelines for, 123
   managing local policies, 122–123
   order of application, 121
   setting auditing policies, 125–126
   setting for IIS servers, 123–125
Group Policy snap-in, 121–122

H
handshake, FTP, 191
hard drives. See disk drives
hardware
   guidelines for Internet servers, 4–6
   troubleshooting, 278
headers, HTTP, 92, 95–96. See also host headers
hisecws, security templates, 144
HKEY_CLASSES_ROOT, 339
HKEY_CURRENT_CONFIG, 339
HKEY_CURRENT_USER, 339
HKEY_LOCAL_MACHINE, 339
HKEY_USERS, 339
home directory
   configuring for FTP sites, 197–198
   configuring for Web sites, 52–53
hop count, 247
Host field, NCSA common log file format, 312
host headers
   drawbacks of, 45–46
   FTP sites and, 195
   hosting multiple Web sites with, 3
hosting
   on FTP sites, 194
   multiple sites on a single server, 43–46
host names, configuring for Web sites, 53–55
hot fixes, Web server security and, 144–146
HTML (Hypertext Markup Language), 3, 251
HTTP. See Hypertext Transfer Protocol (HTTP)
HTTP Keep-Alives
   configuring, 57–58
   optimizing IIS and, 337
HTTP Monitoring tool, 279
HTTP Request field, NCSA common log file format, 313
Hypertext Markup Language (HTML), 3, 251
Hypertext Transfer Protocol (HTTP)
   compression, 306–307
   enabling logging, 309
   error codes, 99
   vs. FTP, 189–190
   headers, 92, 95–96
   HTTP Monitoring tool, 279
   IIS support for, 3
   Keep-Alives, 57–58
   request types used with ISAPI extensions, 73
   sites, using Microsoft IIS log file format, 323–325
   sites, using NCSA log file format, 322–323
   sites, using ODBC log file format, 327
   sites, using W3C log file format, 325–326
   WebDAV and, 132

I
Identification field, NCSA common log file format, 312
IDQ (Internet data query) files, 258–259
IIS. See Microsoft Internet Information Services (IIS)
IISAdmin
   default Web site directories, 49
   remote administration and, 143
   site control with, 60–61
IISADMPWD virtual directory, 146
IIS Certificate Wizard
   creating certificate requests, 167–168
   deleting pending certificate requests, 175
   processing pending certificate requests, 174
IISHelp
   default Web site directories, 49
   help documentation with, 60–61
IISRESET utility
   rebooting local and remote computers with, 28
   starting, stopping, and re-starting Internet services, 26
   switches of, 26–27
IISSamples, 49
incremental backups. See backup and recovery
indexing
   counters for, 287
   defined, 255
Indexing Service, 251–273
   catalogs, building, 256
   catalogs, installed, 253–254
   catalogs, searching, 258–259
   controlling through Registry, 314–343
   document types indexed by, 252
   installing, 252
   logging on with local system account, 112
   management options for, 252–253
   overview of, 9, 251
   processing documents, 255
   Registry settings for scanning and merging, 257–258
   shadow merges and master merges, 256–257
   storing document values in property cache, 256
   types of scans performed by, 255–256
   using with IIS, 3
Indexing Service, catalog management, 268–273
   adding physical directories to catalogs, 268–269
   forcing full and incremental directories rescans, 270
   merging catalogs, 271
   specifying Web or NNTP sites to include in catalogs, 271–272
   starting, stopping, and pausing individual catalogs, 270–271
   testing catalogs with queries, 272–273
   viewing catalog properties and directories, 268
Indexing Service, core administration, 260–267
   configuring Web resources for indexing, 260
   optimizing performance, 265–267
   setting properties, 263–265
   starting, stopping, and pausing indexing, 263
   viewing and creating catalogs, 261
   viewing indexing status, 261–263
Indexing Service Usage dialog box, 266
INETINFO.EXE, 18, 25
inherited permissions, overriding, 120
Internet data query (IDQ) files, 258–259
Internet Guest account, managing, 113–115
Internet Information Services (IIS). See Microsoft Internet Information Services
Internet Information Services snap-in, 202
   accessing, 22–23
   Access tab, 234–235
   administrative tools and, 11
   associating catalogs with Web sites/NNTP sites, 268
   configuring FTP sites, connection limits and time-outs, 199–200
   configuring FTP sites, home directory, 197–198
   configuring FTP sites, IP addresses and ports, 198–199
   configuring FTP sites, physical directories, 200–201
   configuring FTP sites, request redirection, 202
   configuring FTP sites, setting welcome, exit and maximum connection messages, 202–203
   configuring FTP sites, virtual directories, 201
   connecting to other servers, 24
   creating certificate requests, 167
   defining custom applications, 75–77
   deleting files, 63
   managing Internet services, 25–27
   managing resources, 27–28
   rebooting IIS servers, 28
   rebooting local/remote computers, 28
   renaming files, 63
   starting and using, 22–24
Internet Information Services snap-in, managing certificates, 180–185
   exporting site certificates, 183–184
   ignoring, accepting, and requiring client certificates, 184–185
   renewing, removing, and replacing certificates, 182–183
   requiring SSL for all communi-cations, 185
   viewing and modifying issued certificates, 180–182
Internet Network Information Center (InterNIC), 42
Internet Protocol (TCP/IP) Properties dialog box, 47
Internet Server Application Programming Interface (ISAPI)
   choosing over ASP or CGI, 335
   custom applications and, 71
   customizing IIS and, 71–73
   ISAPI extensions, 73, 147
   ISAPI filters, 72–73, 90–92
   optimizing in IIS, 336–337
   role in IIS architecture, 18–19
Internet servers, hardware for, 4–6
Internet services. See also Microsoft Internet Information Services (IIS)
   configuring backup and recovery for, 32–33
   configuring startup, 31–32
   installing, 8–9
   starting, stopping, and restarting, 25–27
Internet Services Manager
   administration techniques using, 12
   IIS component installation and, 6
InterNIC (Internet Network Information Center), 42
intranets, name resolution and, 42
IP addresses
   checking, 46–48
   configuring for FTP, 198–199
   configuring for SMTP, 221–222
   configuring for Web sites, 53–55
   FTP security and, 210–212
   IIS security and, 137–139
   setting with Web Site Creation Wizard, 50
   viewing, 47
   virtual server access by, 234–235
   Web servers and, 46–48
   Web sites and, 41–43
ISAPI. See Internet Server Application Programming Interface (ISAPI)
Issued Certificates node, Certification Authority snap-in, 163
IUSR_ComputerName, 112
IWAN_ComputerName, 112

J
Java Servlet Pages, 71
JScript, IIS installation and, 88
jump pages, advertising with, 108–109

K
keys
   encryption and, 149–150
   IIS metabase and, 13
   Windows Registry, 339–340

L
legal notices, creating, 143–144
local group policies, 122–123
local permissions. See permissions
local recipients, SMTP, 218
local service domains, SMTP
   changing Drop directory for default domain, 226
   creating alias domains, 225
   setting default domains, 226
local system account, 112
logging, user access, 309–331
   access log formats, 310
   disabling, 331
   log file naming conventions, 321
   Microsoft IIS log file format, configuring, 323–325
   Microsoft IIS log file format, fields of, 315–316
   Microsoft IIS log file format, overview of, 314–315
   NCSA common log file format, configuring, 322–323
   NCSA common log file format, Host field, 312
   NCSA common log file format, HTTP Request field, 313
   NCSA common log file format, Identification field, 312
   NCSA common log file format, Status Code field, 314
   NCSA common log file format, Time Stamp field, 313
   NCSA common log file format, Transfer Volume field, 314
   NCSA common log file format, User Authentication field, 313
   ODBC log file format, configuring, 327–330
   ODBC log file format, overview of, 319–320
   ODBC log file format, table fields for, 320
   types of logging, 309
   understanding, 320–322
   W3C extended log file format, configuring, 325–326
   W3C extended log file format, directives used with, 317
   W3C extended log file format, field identifiers used with, 318
   W3C extended log file format, overview of, 316
   W3C extended log file format, prefixes used with, 317–318
   W3C extended log file format, process accounting fields of, 319
Logging Properties dialog box, 280
logon accounts, 112–113
logs
   access logs, 280–281
   counter logs, 290–293
   events logs, 281–284
   finding location of, 280–281
   performance logs, logging over extended period, 294–295
   performance logs, creating and managing, 290
   reducing overhead of, 336
   trace logs, 293–294
LOGTEMP.SQL script, 320

M
mail processing, SMTP, 218–219
mail recipients, SMTP, 218
mail relaying. See relay restrictions
Mailroot folders, 217–218
   subfolders of, 217
   using separate folders for each virtual server, 223
marshalling, applications, 78
masquerade domains, 247
master FTP service properties, 194
master merges, Indexing Service, 256–257
Master Properties dialog box, 127–130
master Web service properties, 48
maximum connection messages, FTP sites, 203
memory
   counters for, 286
   requirements for Internet servers, 5
   Web servers, bottlenecks, 300–301
   Web servers, checking use of, 299
   Web servers, setting application performance, 298
   Web servers, setting data throughput, 298–299
memory paging, 300–301
merges, Indexing Service
   master merges, 256–257
   merging catalogs, 271
   overview of, 255
   Registry settings for, 257–258
   shadow merges, 256–257
message delivery, SMTP
   configuring reverse DNS lookups, 248–249
   routing outgoing messages to smart host, 249
   setting domain name options, 247–248
   setting message hop count, 247
   setting retry intervals, delay notification and expiration time-out, 245–246
message limits, SMTP, 241–242
metabase, 343
   examining and editing, 344–345
   modifying properties, 345–348
   scripting, 348–351
Metabase Editor (METAEDIT.EXE), 344–345
metrics, 278
Microsoft Active Server Pages (ASPs)
   built-in ASP objects, 74
   creating queries with, 258–259
   custom applications and, 71
   IIS support for, 3
   vs. ISAPI, 335
   modifying script engine cache, 338
   optimizing ASP applications, 336–337
   pre-built components for ASP applications, 75
   session counters, 285
   transaction counters, 285–286
   understanding, 74–75
Microsoft Certificate Services
   accessing in a browser, 158–159
   approving/declining certificate requests, 163
   backing up and restoring the CA, 160–162
   creating certificate requests, 167–170
   deleting pending certificate requests, 175
   generating certificates manually, 163
   installing, 155–157
   overview of, 154–155
   processing pending certificate requests, 174
   reviewing/renewing root CA certificate, 165–166
   revoking certificates, 164
   stopping and starting, 159–160
   submitting certificate requests to, 172–174
   submitting certificate requests to third-party authorities, 170–171
Microsoft Exchange 2000 Server, 215
Microsoft Internet Information Services (IIS)
   architecture, 17–18
   authentication, 8
   configuring ODBC logging, 330
   default user accounts, 9
   error detection, access logs, 280–281
   error detection, events logs, 281–283
   hardware guidelines for Internet servers, 4–6
   installing administration tools, 10–11
   installing components and default sites, 6–8
   installing Internet services, 8–9
   key features of, 3–4
   logging on with local system account, 112
   managing, configuring service recovery, 32–33
   managing, configuring service start up, 31–32
   managing, core services, 30
   managing, starting stopping and pausing, 30–31
   managing, using Services node, 29–30
   performance tuning, configuring automatic restarts, 338–339
   performance tuning, optimizing content usage, 334–336
   performance tuning, optimizing IIS caching and queuing, 337–338
   performance tuning, optimizing ISAPI and ASP applications, 336–337
   performance tuning, removing unnecessary applications and services, 333–334
   reasons for monitoring, 277–278
   Registry and, 341–342
   resource management, 9–10
   servers, rebooting, 28
   servers, setting group policies, 123–125
   servers, storing configuration, 33–35
   Web administration techniques, 11–15
Microsoft Internet Information Services (IIS), backing up and recovering, 33–37
   creating configuration backups, 35
   deleting backup configurations, 37
   rebuilding corrupted IIS installation, 36–37
   restoring from backup configura-tions, 36
   storing IIS Server configuration, 33–35
Microsoft Internet Information Services (IIS), custom applications, 71–109
   ASP applications, 74–75
   configuring default documents, 92–93
   configuring document footers, 93–94
   ISAPI applications, 71–73
   ISAPI filters, global, 90–91
   ISAPI filters, local, 91–92
   managing, buffering, 87
   managing, deleting applications, 89–90
   managing, enabling/disabling debugging, 88–89
   managing, error messages configuration, 89
   managing, mapping and caching, 82–85
   managing, parent paths, default ASP language, and ASP script time-out, 88
   managing, pooled and nonpooled applications, 80–82
   managing, session state, 85–87
   managing, uploading isolated applications, 89–90
   MIME types, basic, 103
   MIME types, common, 104
   MIME types, viewing and configuring, 105–106
   tips, handling 404 errors and preventing dead ends, 109
   tips, updating sites to manage outages, 107–108
   tips, using jump pages for advertising, 108–109
   using content expiration, 94–95
   using content ratings, 96–97
   using custom HTTP headers, 95–96
   Web Server error messages, customizing, 100–102
   Web Server error messages, standard HTTP error codes, 99
   Web Server error messages, status codes and, 98
Microsoft Internet Information Services (IIS), log file format
   configuring, 323–325
   fields, 315–316
   overview, 314–315
   overview of, 310
Microsoft Internet Information Services (IIS), security, 127–141
   authentication modes, enabling/disabling, 135–137
   authentication modes, overview, 134–135
   configuring IP address and domain name restrictions, 137–139
   WebDAV, accessing and publishing documents, 133
   WebDAV, permitting distributed authoring and versioning, 132–133
   Web server permissions, global, 128–130
   Web server permissions, local, 130–132
   Web server permissions, overview, 127–128
   Web site operators, assigning, 141
   Web site operators, overview, 140
   Web site operators, permitting operator administration, 141
Microsoft Management Console (MMC) snap-ins, 22, 252–253. See also by individual type
Microsoft Script Debugger, 88–89
Microsoft Visual Basic Scripting Edition (VBScript)
   checking for malicious users with, 146
   IIS installation and, 88
   managing Registry with, 340–341
   modifying metabase properties with, 345
Microsoft Windows 2000
   file and directory structure of, 17
   IIS directory based on file structure of, 58
   integration with IIS, 17–18
   naming conventions used by, 42
   permissions of, 18
Microsoft Windows 2000 Advanced Server, 6
Microsoft Windows 2000 Datacenter Server, 6
Microsoft Windows 2000 Professional
   limitations of, 44, 194
   using with IIS, 6
Microsoft Windows 2000 Resource Kit, 279
Microsoft Windows 2000 Server
   hosting multiple FTP sites, 194
   hosting multiple Web sites, 44
   using with IIS, 6
Microsoft Windows security
   file and folder permissions, guidelines based on content type, 118
   file and folder permissions, list of, 117
   file and folder permissions, overview, 117–118
   file and folder permissions, setting, 119–121
   file and folder permissions, viewing, 119
   FTP site permissions, 208
   group policies, overview, 121–123
   group policies, setting auditing policies, 125–126
   group policies, setting for IIS servers, 123–125
   SMTP authentication and, 236–237, 239
   user and group accounts, Internet Guest account, 113–115
   user and group accounts, logon accounts, 112–113
   user and group accounts, overview, 112
   user and group accounts, Web application account, 115–116
MIME. See Multipurpose Internet Mail Extension (MIME) types
MMC. See Microsoft Management Console (MMC) snap-ins
monitoring. See performance, tuning and monitoring
multiple identities, SMTP, 222–223
Multipurpose Internet Mail Extension (MIME) types
   basic, 103
   common, 104
   custom applications and, 71
   viewing and configuring, 105–106

N
name resolution, Web sites, 41–43
names
   checking computer names, 46–48
   domain names, FTP security and, 213
   domain names, IIS security and, 137–139
   domain names, InterNIC and, 42
   domain names, setting options, 247–248
   FTP sites, 193–194
   fully qualified domain names (FQDNs), FTP sites, 189
   fully qualified domain names (FQDNs), SMTP virtual servers, 247
   URL formats, 19–21
   usernames, anonymous access and, 8
   usernames, URLs and, 20
   Web sites, hosting multiple sites on a single server, 43–46
   Web sites, host names, 53–55
   Web sites, IP addresses and name resolution and, 41–43
   Web sites, understanding identifiers, 43
naming conventions
   log files and, 321–322
   Uniform Naming Convention (UNC), 43
National Center for Supercomputing Applications (NCSA) common log file format, 310–314
   configuring, 322–323
   Host field, 312
   HTTP Request field, 313
   Identification field, 312
   overview of, 310–311
   Status Code field, 314
   Time Stamp field, 313
   Transfer Volume field, 314
   User Authentication field, 313
NetBIOS naming convention, 42
Network Identification tab, 248
Network News Transfer Protocol (NNTP)
   associating catalogs with, 268
   bundled with IIS, 3
   installing default sites, 7–8
   installing service, 6
   overview of, 9
   specifying sites to include in catalogs, 271–272
networks, bandwidth and connectivity, 304–307
   configuring HTTP compression, 306–307
   configuring throttling and connection limits, 305–306
network shares
   redirecting requests to, 202
   retrieving files from, 65–66
New SMTP Virtual Server Wizard, 220
NNTP. See Network News Transfer Protocol (NNTP)
nondelivery reports, SMTP, 219, 243
nonpooled applications, 80–82

O
open database connectivity (ODBC) log file format
   configuring, creating DSN for SQL Server 2000, 328–330
   configuring, for IIS, 330
   configuring, creating logging database and table in SQL Server 2000, 327–328
   overview, 309–310, 319–320
   table fields, 320
operators, FTP sites, 213
operators, Web sites
   administrative privileges of, 140
   assigning, 141
   overview, 140
   permitting operator administration, 141
outages
   avoiding, 107–108
   uninterruptible power supply (UPS) and, 6


Next




Top of Page


Last Updated: Friday, July 6, 2001