Microsoft IIS 6.0Administrator's Consultant

Chapter 1: Overview of Microsoft Web Services

Figure 1-1: Use the Windows Component Wizard to select components to add or remove.
Figure 1-2: Use the IIS snap-in to manage local and remote IIS installations.
Figure 1-3: Use Remote Administration to manage remote IIS installations.

Chapter 2: Core IIS Administration

Figure 2-1: Here is a conceptual view of the IIS 5 isolation mode.
Figure 2-2: Use DLL Host (Dllhost.exe) to manage out-of-process ISAPI applications.
Figure 2-3: Use the IIS snap-in to manage Web, FTP, SMTP, and NNTP resources.
Figure 2-4: Stop, start, and restart all Internet Services.
Figure 2-5: Use the Services node to manage IIS services.
Figure 2-6: For troubleshooting, you might want to change the service startup option.
Figure 2-7: You can configure services to recover automatically in case of failure.

Chapter 3: Configuring Web Sites and Servers

Figure 3-1: You can use multiple IP addresses to host multiple Web sites on a single server.
Figure 3-2: Another technique is to use multiple port numbers to host multiple Web sites on a single server.
Figure 3-3: You can use host headers to support multiple Web sites on a single server, with a single IP address.
Figure 3-4: Use the Internet Protocol (TCP/IP) Properties dialog box to view and configure TCP/IP settings.
Figure 3-5: Set the IP address and port values for the new site in the Web Site Creation Wizard.
Figure 3-6: Set access permissions for the Web site in the Web Site Creation Wizard.
Figure 3-7: You can change a site’s home directory at any time.
Figure 3-8: You modify a site’s identity through the Web Site tab in the Properties dialog box.
Figure 3-9: Web sites can have multiple identities.

Chapter 4: Customizing Web Server Content

Figure 4-1: Use the Web Service Extensions node to allow or prohibit IIS to process various types of nonstatic content.
Figure 4-2: You can redirect requests for files in one directory to another directory.
Figure 4-3: Another redirection technique is to redirect all requests for files to a specific location at another Web site.
Figure 4-4: Network shares can be used as source directories for content. To map to a share, you must use redirection.
Figure 4-5: The Custom Errors tab shows the error settings for the site, directory, or file you’ve selected for editing.
Figure 4-6: The Edit Custom Error Properties dialog box provides an overview of the error and how it’s handled.
Figure 4-7: Use the MIME Types dialog box to view and configure computer MIME types.

Chapter 5: Running IIS Applications

Figure 5-1: ISAPI acts as a layer over IIS.
Figure 5-2: Use .NET Configuration to view and manage ASP.NET assemblies.
Figure 5-3: Use the Properties dialog box to configure custom applications.
Figure 5-4: Use the Application Configuration property sheet to control which components are available to IIS applications and how those components are managed in memory.
Figure 5-5: Add new application mappings using the Add/Edit Application Extension Mapping dialog box.

Chapter 6: Managing ASP.NET, Application Pools, and Worker Processes

Figure 6-1: ASP.NET isn’t installed by default when you install an Application Server. You must choose ASP.NET as one of the installation components.
Figure 6-2: The virtual directory alias sets the name of the application.
Figure 6-3: Use the Add New Application Pool dialog box to set the name of the application pool and determine how the default settings are obtained.
Figure 6-4: Use the options of the Identity tab to set the application pool identity to a predefined or previously configured account.
Figure 6-5: Worker processes can be recycled automatically based on time, number of requests, and memory usage.
Figure 6-6: Configure CPU monitoring to ensure that runaway processes are reported or terminated.
Figure 6-7: Pinging and rapid-fail protection are important monitoring techniques for detecting and recovering from problems.
Figure 6-8: Set the idle time-out to meet your application environment’s needs.

Chapter 7: Managing Web Server Security

Figure 7-1: Use the Log On tab to configure the service logon account.
Figure 7-2: Set the Web application account identity as Predefined or Configurable.
Figure 7-3: For IIS 5 isolation mode, set the Web application account identity in the Component Services snap-in.
Figure 7-4: Use the Security tab to configure basic permissions for the file or folder.
Figure 7-5: Use the Group Policy tab of the Properties dialog box to create and edit policies.
Figure 7-6: Set policies for passwords and general account use.
Figure 7-7: With local policies, you’ll see the current policy setting.
Figure 7-8: Define and configure global group policies using the Properties dialog box.
Figure 7-9: Manage Web server permissions globally using the Home Directory tab on the Web Sites Properties dialog box.
Figure 7-10: Manage permissions for individual sites, virtual directories, and files using the Properties dialog box for that site, virtual directory, or file.
Figure 7-11: Use the Authentication Methods dialog box to enable or disable authentication methods to meet your organization’s needs. With basic authentication, it’s often helpful to set a default domain as well.
Figure 7-12: You can grant or deny access by IP address, network ID, and domain.
Figure 7-13: Use the Security Templates snap-in to access existing security templates and to create new ones.

Chapter 8: Managing Microsoft Certificate Services and SSL

Figure 8-1: Use the Certification Authority snap-in to manage Certificate Services.
Figure 8-2: Choose the type of CA that you want to install.
Figure 8-3: Identify the CA and set an expiration date for the root CA certificate.
Figure 8-4: Use the Web-based interface to retrieve CA certificates or revocation lists, to request certificates, or to check on pending certificates.
Figure 8-5: You can connect to both local and remote CAs.
Figure 8-6: Specify the certification items that you want to back up.
Figure 8-7: Specify the certification items that you want to restore from a backup.
Figure 8-8: In the Certificate Revocation dialog box, specify the reason you’re revoking the certificate.
Figure 8-9: Set the schedule for publishing the CRL. By default, the publication interval is a week.
Figure 8-10: The Certificate dialog box shows the root CA certificate’s properties.
Figure 8-11: When you renew the root CA certificate, you can generate new public and private keys. Do this if the key has been compromised or a new key is required.
Figure 8-12: To create a certificate, select Create A New Certificate.
Figure 8-13: Specify a descriptive name and bit length for the certificate.
Figure 8-14: Type complete entries for geographic information.
Figure 8-15: When you access the Certificate Services URL, you should see the main page for the Web-based interface. If you don’t, you might not have configured Web access correctly.
Figure 8-16: Process the pending request and install the certificate file.
Figure 8-17: Specify a port value for SSL.
Figure 8-18: Web sites can have multiple SSL identities. The port that is set in the Web Site tab is the primary identity; the others are alternatives that must be specified in a URL request.
Figure 8-19: A security alert warns that the browser doesn’t trust your root CA.
Figure 8-20: In the Certificate Import Wizard, select Automatically Select The Certificate Store Based On The Type Of Certificate.
Figure 8-21: The Certificate dialog box provides summary information on the site certificate, and you can use it to modify properties and export the certificate to a file.
Figure 8-22: You can modify certificate purposes to meet your organization’s needs.
Figure 8-23: You can renew, remove, or replace a certificate at any time using the Web Server Certificate Wizard.
Figure 8-24: Sites can ignore, accept, or require client certificates.

Chapter 9: Managing FTP Servers

Figure 9-1: Set the IP address and port values for the new FTP site.
Figure 9-2: Set user isolation mode for the FTP site.
Figure 9-3: You can change a site’s home directory at any time.
Figure 9-4: You modify a site’s identity through the FTP Site tab in the Properties dialog box.
Figure 9-5: Current FTP user sessions are displayed by user name, IP address, and connection duration.
Figure 9-6: Use the Security Accounts tab to configure anonymous access.
Figure 9-7: Use the FTP Sites Properties dialog box to configure FTP permissions.
Figure 9-8: Use the site’s Properties dialog box to configure FTP permissions.
Figure 9-9: You can grant or deny access by IP address, network identification, and domain.

Chapter 10: Configuring and Maintaining E-Mail Services

Figure 10-1: Use the New SMTP Virtual Server Wizard to create additional virtual servers.
Figure 10-2: You modify a site’s identity through the General tab in the SMTP Virtual Server Properties dialog box.
Figure 10-3: SMTP virtual servers can respond on multiple IP addresses and ports. Configure additional identities using the Advanced dialog box.
Figure 10-4: SMTP virtual servers can have local alias, local default, and remote service domains.
Figure 10-5: The Drop directory is used by the default domain and all alias domains configured on the virtual server. You can change the directory location and quota configuration at any time.
Figure 10-6: You can configure remote domains to allow or prevent mail relaying. Mail relaying is prevented by default.
Figure 10-7: You can queue messages addressed to specific users in a remote domain; then the user’s mail client can trigger delivery of those messages.
Figure 10-8: Select the outbound security options and add TLS encryption if it’s supported by the remote domain.
Figure 10-9: Use the Properties dialog box to configure properties for all POP3 domains on a server.
Figure 10-10: Domain statistics provide a quick overview of mailboxes, messages, and state of the mailboxes for each domain.
Figure 10-11: Use the Add Mailbox dialog box to create mailboxes for the e mail domain. Mailboxes should follow the same naming and strict password requirements as any other type of account.

Chapter 11: Advanced E-Mail Service Configuration Options

Figure 11-1: You can control connections by IP address, subnet, or domain.
Figure 11-2: You can enable or disable authentication methods to meet your organization’s needs. With basic authentication it’s often helpful to set a default domain as well.
Figure 11-3: Connection limits and time-outs can help reduce server load. They can also help to resolve connection problems.
Figure 11-4: As with incoming connections, limits and time-outs on outbound connections can help reduce server load and resolve connection problems.
Figure 11-5: You can use messaging limits to control SMTP usage and to improve performance.
Figure 11-6: If necessary, you can grant or deny computers, groups of computers, or domains the right to relay mail through your organization.
Figure 11-7: Use the options in the Delivery tab to control message delivery in the organization.
Figure 11-8: Domain name options play an important role in determining how mail is delivered.

Chapter 12: Administering the Indexing Service

Figure 12-1: Use the Indexing Service node in the Computer Management console to manage the Indexing Service.
Figure 12-2: Use the Add Catalog dialog box to create a new catalog on the server.
Figure 12-3: Use the Indexing Service Usage dialog box to optimize indexing and querying.
Figure 12-4: You can customize the way indexing and querying are performed by using the Desired Performance dialog box.
Figure 12-5: You can add physical directories to a catalog and map them to aliases using the Add Directory dialog box.
Figure 12-6: Specify the site to index in the Tracking tab.
Figure 12-7: After you configure indexing, check the configuration using the predefined query form.

Chapter 13: Performance Tuning and Monitoring

Figure 13-1: The Logging Properties dialog box tells you where logs are being written.
Figure 13-2: Event Viewer displays events for the selected log.
Figure 13-3: You can filter events so that only warnings and errors are displayed.
Figure 13-4: Select the counter you want to monitor.
Figure 13-5: Current performance logs are listed with summary information.
Figure 13-6: Configure the log file format and usage.
Figure 13-7: Specify when logging starts and stops.
Figure 13-8: Use the General tab to select the provider to use in the trace.
Figure 13-9: Use the Alert dialog box to configure counters that trigger alerts.
Figure 13-10: Set actions that are executed when the alert occurs.
Figure 13-11: Use the Local Area Connection Properties dialog box to configure file and printer sharing settings for the Web server.
Figure 13-12: Use the Service tab to configure HTTP compression.

Chapter 14: Tracking User Access and Logging

Figure 14-1: Use the common log format when you have basic logging requirements.
Figure 14-2: Use the IIS log format when you have additional logging requirements but don’t need to customize settings.
Figure 14-3: Use the extended log file format when you need to customize the logging process.
Figure 14-4: Use the Create A New Data Source To SQL Server dialog box to configure the data source.
Figure 14-5: Set the authentication method for the DSN connection.
Figure 14-6: Use ODBC logging when you need to write to a database.

Chapter 15: IIS Optimization and the Metabase

Figure 15-1: Configure the IIS Admin Service to run the IIS Reset utility.
Figure 15-2: MetaBase.xml is a structured XML file that can be viewed in any standard text editor.

Chapter 16: IIS Backup & Recovery

Figure 16-1: Use Configuration Backup/Restore to create, restore, and delete IIS configuration backups.
Figure 16-2: Use the Import Configuration dialog box to create and restore sites from backups.
Figure 16-3: The Windows Backup utility provides a user-friendly interface for backup and restore operations.
Figure 16-4: You can view existing file exclusions for users in the Exclude Files tab.
Figure 16-5: Use the Add Excluded Files dialog box to set file exclusions for users.
Figure 16-6: Use the Backup tab to configure backups and then click Start Backup.
Figure 16-7: Specify the files and folders to restore.

Категории