Information Server IIS is the most powerful and popular application in the BackOffice family of products, and as with the entire BackOffice component, IIS is built around the Windows NT system. It runs as a set of services provided by Windows NT Server, allowing it to take advantage of the various software features of Windows NT.
However, ensuring that your data integrity remains a critical security issue that must be taken seriously. With its rich and powerful authentication, access control, and auditing capabilities, IIS can guarantee data integrity because it is based on a Windows NT server system. In addition, it supports Secure Sockets Layer SSL, which guarantees secure communications more confidentially by encrypting conversations between IIS and all browsers that support SSL.
Hackers know that most Web and FTP Web sites allow anonymous access. These sites are often incorrectly configured, so there are security vulnerabilities. Here's what you need to do to ensure that IIS makes your network and data completely immune to hacking.
First, using existing Windows NT security to protect IIS ISS from providing security through the Windows NT security model, the user accounts and groups defined in the Security Accounts Manager database will determine what they can do once the user is connected to the IIS machine. It is important that you not only check your existing account rights and permissions, but also restrict the account permissions and permission rights used for anonymous access.
All of the service programs that log IIS support a wide range of logging capabilities. Logging is important because it can be used to monitor suspicious activities to determine what should be retained and what should be canceled for capacity planning.
It is easy to start logging, and events for each service are recorded together in the same common file. To start logging, open IIS Maneger and double-click the server for which you want to start logging to display the Properties dialog box. Then click the Logging tab and a dialog box will pop up. The usage of the label is fairly straightforward, you simply click the Enable Logging option, and then you choose whether to log to a text file or to a SQL database and determine how often the log file is updated.