IIS Lecture
IIS Lecture
CYB306
What is IIS?
Internet Information Services (IIS) is a Microsoft web server that
runs on Windows operating system and is used to exchange static
and dynamic web content with internet users.
An IIS web server accepts requests from remote client computers
and returns the appropriate response. This basic functionality
allows web servers to share and deliver information across
corporate intranets and the Internet.
IIS uses various protocols for communication and data exchange
with remote clients or computers, such as HTTP, SMTP, and FTP.
What is IIS?
Website hosting: IIS application server can host enterprise web applications,
websites, and WCF services.
Logging: IIS server logs contain critical information about your server and
website, including usage patterns, performance issues, etc. Analyzing these log
files helps you identify and troubleshoot problems.
Request Filtering: Microsoft IIS server provides a Request Filtering module to
scan and filter potentially dangerous client requests. You can apply
appropriate traffic filtering rules based on parameters such as file extensions,
URL length, and maximum string size.
Native support: IIS natively supports the Microsoft .NET framework and
libraries, allowing developers to quickly build, deploy, and manage ASP.NET
web applications on IIS.
How IIS Works?
Through a variety of standard languages and protocols. HTML is
used to create elements such as text, buttons, image placements,
direct interactions/behaviours and hyperlinks.
Hypertext Transfer Protocol (HTTP) is the basic communication
protocol used to exchange information between web servers and
users.
HTTPS - HTTP over Secure Sockets Layer (SSL) - uses Transport Layer
Security (TLS) or SSL to encrypt the communication for added data
security
Benefits of using IIS
Robust security:
built-in authentication, authorization, and access control features
can create system and application administrator accounts individually for
granular-level access
request filtering to whitelist/blacklist traffic, dynamic IP blocking, SSL
and TLS encryption, webpage compression, and FTP-specific security
controls.
Benefits of using IIS
Application pools:
helps separate web applications in IIS for better security and availability.
IIS Server Farm can add or remove servers to dynamically scale your
website traffic handling capabilities
IIS Metrics and Logs
Can monitor web application performance through HTTP ping
checks and performance monitoring software. HTTP ping gives
basic monitoring capabilities, while the monitoring software
provides more granular information on your server performance.
IIS server logs maintain a detailed record of every HTTP request to
your web server. Can enable the logging feature via IIS manager to
store critical information for sites in ASCII text-based formats such
as Microsoft IIS, NCSA, and W3C. These log files contain several
fields with detailed information of every request, such as client IP
address, request date and time, server name, and request-response
time.
Authentication Methods
The authentication protocol is any process the web server uses to verify the identity of a user to
ascertain whether or not to grant the user access to network resources.
The authentication process can be grouped based on the way the user’s information is transferred
across the network.
Authentication is a basic and significant practice on the web server particularly when the web server is
hosting private data or a notable business app.
Should select an authentication method based on the requirements of the specific app. You can also
choose an authentication method based on the intention. Some authentication methods include the
following:
Anonymous Login
Basic Authentication
Digest Authentication
Integrated Windows Authentication
NET Passport Authentication
Client/Server Certificates