Configure site Authentication
Open Directory Security
First look at authentication and access control, click its edit
If anonymous access is enabled: The server creates and uses the account IUSR_computername by default. If it is enabled, IIS always tries to authenticate the user with Anonymous authentication, even if other authentication methods are enabled. When a user attempts to connect to a Web site, the Web server assigns the connection to the Windows user account Iusr_conputername, where Conputername is the name of the computer where IIS is running. By default, the IUSR_computername account is included in the Windows user group guests, which has security restrictions and is enforced by NTFS permissions. It indicates the level of access and content types that can be used for public users. During access, IIS checks NTFS file and directory permissions to see if the file is allowed to be accessed by the IUSR_computername account.
Select Integrated Windows Authentication: High security level, which is hashed when using NTLM, and Kerberos tickets are applied when Kerberos is used. However, it cannot cross proxy servers and firewalls unless used on PPTP connections. Use KERBEROSV5 and NTLM authentication. NTLM can filter the firewall through the packet, but it is usually blocked by the proxy server. Kerberos can be passed through a proxy server, but is usually blocked by a packet-filtered fire wall. It cannot be used with HTTP proxy connections.
The Diagram dialog box appears when you select Digest authentication. The point is.