0% found this document useful (0 votes)
30 views

IIS Lecture

IIS is a Microsoft web server that runs on Windows and exchanges static and dynamic web content. IIS accepts requests and returns responses using protocols like HTTP and FTP. IIS can host websites and applications, logs requests for analysis, and filters requests for security. IIS works through standard languages and protocols like HTML and HTTP.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

IIS Lecture

IIS is a Microsoft web server that runs on Windows and exchanges static and dynamic web content. IIS accepts requests and returns responses using protocols like HTTP and FTP. IIS can host websites and applications, logs requests for analysis, and filters requests for security. IIS works through standard languages and protocols like HTML and HTTP.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Windows IIS

CYB306
What is IIS?

Internet Information Services (IIS) is a Microsoft web server that
runs on Windows operating system and is used to exchange static
and dynamic web content with internet users.

An IIS web server accepts requests from remote client computers
and returns the appropriate response. This basic functionality
allows web servers to share and deliver information across
corporate intranets and the Internet.

IIS uses various protocols for communication and data exchange
with remote clients or computers, such as HTTP, SMTP, and FTP.
What is IIS?

Website hosting: IIS application server can host enterprise web applications,
websites, and WCF services.

Logging: IIS server logs contain critical information about your server and
website, including usage patterns, performance issues, etc. Analyzing these log
files helps you identify and troubleshoot problems.

Request Filtering: Microsoft IIS server provides a Request Filtering module to
scan and filter potentially dangerous client requests. You can apply
appropriate traffic filtering rules based on parameters such as file extensions,
URL length, and maximum string size.

Native support: IIS natively supports the Microsoft .NET framework and
libraries, allowing developers to quickly build, deploy, and manage ASP.NET
web applications on IIS.
How IIS Works?

Through a variety of standard languages and protocols. HTML is
used to create elements such as text, buttons, image placements,
direct interactions/behaviours and hyperlinks.

Hypertext Transfer Protocol (HTTP) is the basic communication
protocol used to exchange information between web servers and
users.
 HTTPS - HTTP over Secure Sockets Layer (SSL) - uses Transport Layer
Security (TLS) or SSL to encrypt the communication for added data
security
Benefits of using IIS

Robust security:
 built-in authentication, authorization, and access control features
 can create system and application administrator accounts individually for
granular-level access
 request filtering to whitelist/blacklist traffic, dynamic IP blocking, SSL
and TLS encryption, webpage compression, and FTP-specific security
controls.
Benefits of using IIS

Application pools:
 helps separate web applications in IIS for better security and availability.

 has single or multiple applications managed by one or more worker


processes in IIS.

worker process handles the client requests specific to an application pools

 Isolation ensures the crashing or failure of an application in a particular


pool doesn’t affect the applications in other pools.
Benefits of using IIS

Scalability and reliability:
 IIS Web Farm, which allows high-traffic websites on multiple IIS servers
with load balancing and application request routing (ARR).

A load balancer distributes traffic among multiple servers in the IIS server farm
using sophisticated algorithms

ARR determines the best content server for every request

 IIS Server Farm can add or remove servers to dynamically scale your
website traffic handling capabilities
IIS Metrics and Logs

Can monitor web application performance through HTTP ping
checks and performance monitoring software. HTTP ping gives
basic monitoring capabilities, while the monitoring software
provides more granular information on your server performance.

IIS server logs maintain a detailed record of every HTTP request to
your web server. Can enable the logging feature via IIS manager to
store critical information for sites in ASCII text-based formats such
as Microsoft IIS, NCSA, and W3C. These log files contain several
fields with detailed information of every request, such as client IP
address, request date and time, server name, and request-response
time.
Authentication Methods

The authentication protocol is any process the web server uses to verify the identity of a user to
ascertain whether or not to grant the user access to network resources.

The authentication process can be grouped based on the way the user’s information is transferred
across the network.

Authentication is a basic and significant practice on the web server particularly when the web server is
hosting private data or a notable business app.

Should select an authentication method based on the requirements of the specific app. You can also
choose an authentication method based on the intention. Some authentication methods include the
following:
 Anonymous Login
 Basic Authentication
 Digest Authentication
 Integrated Windows Authentication
 NET Passport Authentication
 Client/Server Certificates

You might also like