SlideShare uma empresa Scribd logo
1 de 10
IIS 6.0 General System Admin Overview
Configured as a static content (html) web server by default. To provide dynamic content (asp, asp.net, php, etc.) it should be configured using Web Services Extensions (in the form of dll’s, exe’s, cgi’s, etc). Web applications are isolated from each other using Application Pools by default. Create application pool Host web application in a virtual directory. IIS 6.0 Characteristics
Websites files are located in  	C:netpubwwroot Server files and configuration (metabase –xml file) is located in C:indowsystem32netsrv Logs files are located in Web server error log C:indowsystem32ogfilesTTPErr Web sites logs in C:indowsystem32ogfileslt;web site folder> IIS 6.0 Characteristics
Contains worker process w3wp.exe for application Could have more than a single worker process (called web garden) Memory configured using Recycling tab CPU configured using Performance tab Status check configured using Health tab Security account configured using Identity tab Network Service account ( network access only) Local Service account (local access only) Local System (network and local access) Application Pools (for dynamic content)
Web sites can have multiple applications hosted. ASP pages,ASP.Net pages Scripts CGI These applications can be assigned to different application pools (preferred method) By default all dynamic content is assigned to the default application pool in the web site properties Home Directory/Application settings tab Application Pools (for dynamic content)
Shared web hosting using: IP addresses (used for sites that use ssl) Tcp port numbers Host headers (preferred method) To use ssl (for encrypted communications),  server certificate needs to be requested and installed (as well as the private key). Contains dns name for web site Valid date Issuance information Public encryption key Web sites
The only way to constrain File System Object in a shared environment is with NTFS File System ACLs.  The most secure way to do this is to: Create one Application Pool per website Create unique Windows user for each Application Pool. Assign this Windows user as both Custom Application Pool Identity and Anonymous user identity for the website. ACL files on file system to the Windows user for all files the website should have access to. 	Basically, you force each Website to run as a unique Windows user (both process and anonymous authenticated identities), which forces all FSO usage to also run as that Windows user. You then apply NTFS ACLs for the Windows user as appropriate. Web Site Security
To disable FSO: regsvr32 scrrun.dll /u To disable WSH: regsvr32 wshom.ocx /u Web Site Security
To archive an IIS 6.0 Web site, run the following command on (or "against") the IIS 6.0 site. msdeploy -verb:sync -source:metakey=lm/w3svc/SITEID -dest:archivedir=c:rchive,encryptPasword=PASSWORD > msdeployarchive.log  To restore the IIS 6.0 Web site from an archive, run the following command on (or "against") the IIS 6.0 site: msdeploy -verb:sync -source:archivedir=c:rchive,encryptPasword=PASSWORD  -dest:metakey=lm/w3svc/SITEID >msdeployarchive.log  Web Site – Disaster Recovery
Configured as a Web Service Extension, examples: Tomcat connector Policy based authentication and single sign on –  CA SiteMinder Proxy services

Mais conteúdo relacionado

Mais procurados

Mais procurados (11)

Apache Web Server Setup 1
Apache Web Server Setup 1Apache Web Server Setup 1
Apache Web Server Setup 1
 
Apache Web Server Setup 3
Apache Web Server Setup 3Apache Web Server Setup 3
Apache Web Server Setup 3
 
Apache Web Server Setup 4
Apache Web Server Setup 4Apache Web Server Setup 4
Apache Web Server Setup 4
 
Apache Web server Complete Guide
Apache Web server Complete GuideApache Web server Complete Guide
Apache Web server Complete Guide
 
Freeingwebhost
FreeingwebhostFreeingwebhost
Freeingwebhost
 
Centralized logging for (java) applications with the elastic stack made easy
Centralized logging for (java) applications with the elastic stack   made easyCentralized logging for (java) applications with the elastic stack   made easy
Centralized logging for (java) applications with the elastic stack made easy
 
Apache Ppt
Apache PptApache Ppt
Apache Ppt
 
Armsec 2017 | 2 bugs 1 safari
Armsec 2017 | 2 bugs 1 safariArmsec 2017 | 2 bugs 1 safari
Armsec 2017 | 2 bugs 1 safari
 
test pdf
test pdftest pdf
test pdf
 
OSGi summary
OSGi summaryOSGi summary
OSGi summary
 
PHP Includes
PHP IncludesPHP Includes
PHP Includes
 

Destaque

Web Server Administration
Web Server AdministrationWeb Server Administration
Web Server Administrationwebhostingguy
 
Project Management Base Camp
Project Management Base CampProject Management Base Camp
Project Management Base Campeph-hr
 
Effective store keeping and successful inventory control.2
Effective store keeping and successful inventory control.2Effective store keeping and successful inventory control.2
Effective store keeping and successful inventory control.2Tajudeen Wahabi
 
SharePoint 2013 Site Administration
SharePoint 2013 Site AdministrationSharePoint 2013 Site Administration
SharePoint 2013 Site AdministrationLearning SharePoint
 
Material store & receipts
Material store & receiptsMaterial store & receipts
Material store & receiptsAmar Chaugule
 
Site Engineering Portal
Site Engineering PortalSite Engineering Portal
Site Engineering Portaleresource erp
 
Construction Administration Seminar
Construction Administration Seminar Construction Administration Seminar
Construction Administration Seminar jenkinswilliamc
 
Guide for Construction Contract Administrators
Guide for Construction Contract AdministratorsGuide for Construction Contract Administrators
Guide for Construction Contract AdministratorsSarah Fox
 
Advanced material of construction..ppt24545452
Advanced material of construction..ppt24545452Advanced material of construction..ppt24545452
Advanced material of construction..ppt24545452SHUBHAM DABHADE
 
Production planning & control(ppc)
Production planning & control(ppc)Production planning & control(ppc)
Production planning & control(ppc)Abu Bashar
 
Innovative Building Materials
Innovative Building MaterialsInnovative Building Materials
Innovative Building MaterialsShiva Sparky
 

Destaque (16)

Web Server Administration
Web Server AdministrationWeb Server Administration
Web Server Administration
 
Project Management Base Camp
Project Management Base CampProject Management Base Camp
Project Management Base Camp
 
Effective store keeping and successful inventory control.2
Effective store keeping and successful inventory control.2Effective store keeping and successful inventory control.2
Effective store keeping and successful inventory control.2
 
SharePoint 2013 Site Administration
SharePoint 2013 Site AdministrationSharePoint 2013 Site Administration
SharePoint 2013 Site Administration
 
Material store & receipts
Material store & receiptsMaterial store & receipts
Material store & receipts
 
Site Engineering Portal
Site Engineering PortalSite Engineering Portal
Site Engineering Portal
 
Estimation
EstimationEstimation
Estimation
 
Stores
StoresStores
Stores
 
Construction Administration Seminar
Construction Administration Seminar Construction Administration Seminar
Construction Administration Seminar
 
Behavioral Safety Leadership in Oil & Gas construction
Behavioral Safety Leadership in Oil & Gas constructionBehavioral Safety Leadership in Oil & Gas construction
Behavioral Safety Leadership in Oil & Gas construction
 
Guide for Construction Contract Administrators
Guide for Construction Contract AdministratorsGuide for Construction Contract Administrators
Guide for Construction Contract Administrators
 
Advanced material of construction..ppt24545452
Advanced material of construction..ppt24545452Advanced material of construction..ppt24545452
Advanced material of construction..ppt24545452
 
Store Inventory
Store InventoryStore Inventory
Store Inventory
 
Production planning & control(ppc)
Production planning & control(ppc)Production planning & control(ppc)
Production planning & control(ppc)
 
Innovative Building Materials
Innovative Building MaterialsInnovative Building Materials
Innovative Building Materials
 
Store management
Store managementStore management
Store management
 

Semelhante a IIS 6 - General System Administration Overview

Ch 04 asp.net application
Ch 04 asp.net application Ch 04 asp.net application
Ch 04 asp.net application Madhuri Kavade
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Windows Hosting Documentation
Windows Hosting DocumentationWindows Hosting Documentation
Windows Hosting Documentationwebhostingguy
 
IIS internet information service NSA.ppt
IIS internet information service NSA.pptIIS internet information service NSA.ppt
IIS internet information service NSA.pptImranAhmadAhmad
 
introduction and configuration of IIS (in addition with printer)
introduction and configuration of IIS (in addition with printer)introduction and configuration of IIS (in addition with printer)
introduction and configuration of IIS (in addition with printer)Assay Khan
 
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...Joel Oleson
 
Iis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.comIis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.comphanleson
 
01 asp.net session01
01 asp.net session0101 asp.net session01
01 asp.net session01Vivek chan
 
Aspnet architecture
Aspnet architectureAspnet architecture
Aspnet architecturephantrithuc
 
SharePoint 2007 Presentation
SharePoint 2007 PresentationSharePoint 2007 Presentation
SharePoint 2007 PresentationAjay Jain
 
Lessons from the Field: Setting up SharePoint on Azure
Lessons from the Field: Setting up SharePoint on AzureLessons from the Field: Setting up SharePoint on Azure
Lessons from the Field: Setting up SharePoint on AzureZachary Millis
 
Introducing asp
Introducing aspIntroducing asp
Introducing aspaspnet123
 
Creating php cloud applications
Creating php cloud applicationsCreating php cloud applications
Creating php cloud applicationsCory Fowler
 

Semelhante a IIS 6 - General System Administration Overview (20)

Ch 04 asp.net application
Ch 04 asp.net application Ch 04 asp.net application
Ch 04 asp.net application
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Road Show Asp Net
Road Show Asp NetRoad Show Asp Net
Road Show Asp Net
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Windows Hosting Documentation
Windows Hosting DocumentationWindows Hosting Documentation
Windows Hosting Documentation
 
Chapter 26
Chapter 26Chapter 26
Chapter 26
 
IIS internet information service NSA.ppt
IIS internet information service NSA.pptIIS internet information service NSA.ppt
IIS internet information service NSA.ppt
 
introduction and configuration of IIS (in addition with printer)
introduction and configuration of IIS (in addition with printer)introduction and configuration of IIS (in addition with printer)
introduction and configuration of IIS (in addition with printer)
 
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
 
Hack ASP.NET website
Hack ASP.NET websiteHack ASP.NET website
Hack ASP.NET website
 
TO Hack an ASP .NET website?
TO Hack an ASP .NET website?  TO Hack an ASP .NET website?
TO Hack an ASP .NET website?
 
IIS 7: The Administrator’s Guide
IIS 7: The Administrator’s GuideIIS 7: The Administrator’s Guide
IIS 7: The Administrator’s Guide
 
Iis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.comIis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.com
 
01 asp.net session01
01 asp.net session0101 asp.net session01
01 asp.net session01
 
Aspnet architecture
Aspnet architectureAspnet architecture
Aspnet architecture
 
SharePoint 2007 Presentation
SharePoint 2007 PresentationSharePoint 2007 Presentation
SharePoint 2007 Presentation
 
Lessons from the Field: Setting up SharePoint on Azure
Lessons from the Field: Setting up SharePoint on AzureLessons from the Field: Setting up SharePoint on Azure
Lessons from the Field: Setting up SharePoint on Azure
 
Introducing asp
Introducing aspIntroducing asp
Introducing asp
 
Php Presentation
Php PresentationPhp Presentation
Php Presentation
 
Creating php cloud applications
Creating php cloud applicationsCreating php cloud applications
Creating php cloud applications
 

Mais de Information Technology (20)

Web303
Web303Web303
Web303
 
Sql Server Security Best Practices
Sql Server Security Best PracticesSql Server Security Best Practices
Sql Server Security Best Practices
 
SAN
SANSAN
SAN
 
SAN Review
SAN ReviewSAN Review
SAN Review
 
SQL 2005 Disk IO Performance
SQL 2005 Disk IO PerformanceSQL 2005 Disk IO Performance
SQL 2005 Disk IO Performance
 
RAID Review
RAID ReviewRAID Review
RAID Review
 
Review of SQL
Review of SQLReview of SQL
Review of SQL
 
Sql 2005 high availability
Sql 2005 high availabilitySql 2005 high availability
Sql 2005 high availability
 
MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2
 
MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1
 
Clustering and High Availability
Clustering and High Availability Clustering and High Availability
Clustering and High Availability
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007
 
SharePoint Topology
SharePoint Topology SharePoint Topology
SharePoint Topology
 
Sharepoint Deployments
Sharepoint DeploymentsSharepoint Deployments
Sharepoint Deployments
 
Microsoft Clustering
Microsoft ClusteringMicrosoft Clustering
Microsoft Clustering
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load Balancing
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Migration from ASP to ASP.NET
Migration from ASP to ASP.NETMigration from ASP to ASP.NET
Migration from ASP to ASP.NET
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingSelcen Ozturkcan
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

IIS 6 - General System Administration Overview

  • 1. IIS 6.0 General System Admin Overview
  • 2. Configured as a static content (html) web server by default. To provide dynamic content (asp, asp.net, php, etc.) it should be configured using Web Services Extensions (in the form of dll’s, exe’s, cgi’s, etc). Web applications are isolated from each other using Application Pools by default. Create application pool Host web application in a virtual directory. IIS 6.0 Characteristics
  • 3. Websites files are located in C:netpubwwroot Server files and configuration (metabase –xml file) is located in C:indowsystem32netsrv Logs files are located in Web server error log C:indowsystem32ogfilesTTPErr Web sites logs in C:indowsystem32ogfileslt;web site folder> IIS 6.0 Characteristics
  • 4. Contains worker process w3wp.exe for application Could have more than a single worker process (called web garden) Memory configured using Recycling tab CPU configured using Performance tab Status check configured using Health tab Security account configured using Identity tab Network Service account ( network access only) Local Service account (local access only) Local System (network and local access) Application Pools (for dynamic content)
  • 5. Web sites can have multiple applications hosted. ASP pages,ASP.Net pages Scripts CGI These applications can be assigned to different application pools (preferred method) By default all dynamic content is assigned to the default application pool in the web site properties Home Directory/Application settings tab Application Pools (for dynamic content)
  • 6. Shared web hosting using: IP addresses (used for sites that use ssl) Tcp port numbers Host headers (preferred method) To use ssl (for encrypted communications), server certificate needs to be requested and installed (as well as the private key). Contains dns name for web site Valid date Issuance information Public encryption key Web sites
  • 7. The only way to constrain File System Object in a shared environment is with NTFS File System ACLs. The most secure way to do this is to: Create one Application Pool per website Create unique Windows user for each Application Pool. Assign this Windows user as both Custom Application Pool Identity and Anonymous user identity for the website. ACL files on file system to the Windows user for all files the website should have access to. Basically, you force each Website to run as a unique Windows user (both process and anonymous authenticated identities), which forces all FSO usage to also run as that Windows user. You then apply NTFS ACLs for the Windows user as appropriate. Web Site Security
  • 8. To disable FSO: regsvr32 scrrun.dll /u To disable WSH: regsvr32 wshom.ocx /u Web Site Security
  • 9. To archive an IIS 6.0 Web site, run the following command on (or "against") the IIS 6.0 site. msdeploy -verb:sync -source:metakey=lm/w3svc/SITEID -dest:archivedir=c:rchive,encryptPasword=PASSWORD > msdeployarchive.log To restore the IIS 6.0 Web site from an archive, run the following command on (or "against") the IIS 6.0 site: msdeploy -verb:sync -source:archivedir=c:rchive,encryptPasword=PASSWORD -dest:metakey=lm/w3svc/SITEID >msdeployarchive.log Web Site – Disaster Recovery
  • 10. Configured as a Web Service Extension, examples: Tomcat connector Policy based authentication and single sign on – CA SiteMinder Proxy services