As we all know, Microsoft products always attract hackers, and IIS is no exception.
What is IIS
As one of the popular Web servers, IIS provides powerful Internet and Intranet services. Therefore, there are still many units that use IIS as Web server software. By default, these servers must allow public access to their
Basic knowledge of the format of IIS files
The IIS format is a fixed (not customizable) ASCII format, and the IIS format includes some basic items, such as the user's IP address, user name, request date and time, service status code, and number of bytes received. In addition, the IIS format includes detailed items suc
Anyone who has seen the IIS log time knows that the time that IIS records by default is GMT, which is 8 hours from the time we use Beijing, so it is inconvenient to look at the log.
We have a very small set of IIS log time to us
AWStats is a well-known Web/Mail/FTP server log file analysis tool on sourceforge.net.Installation and configuration steps (applicable to IIS Log File Analysis)1. Download AWStats,: http://sourceforge.net/projects/awstats/2. Since AWStats is written by Pertl, You need to download the Perl interpreter: http://activestate.com/Products/ActivePerl/3. Install the Perl
Anyone who has read the IIS log time knows that the default time recorded by IIS is Greenwich Mean Time, which is 8 hours different from the Beijing time we use. This makes it inconvenient to view logs.
We use a very small setting to make IIS log time use the time zone se
Web site IIS Log is one of the most important things, because there can query the search engine crawling situation, can also learn some of their own site, can be analyzed to some of the user's antecedents, not necessarily with the flow statistics code to calculate, but look at the Web site IIS log also some space busin
This document explains how to use log analyzer (readlogs.exe) to diagnose Microsoft Internet Information Server (IIS) problems. This article also discusses some general debugging concepts and explains what to look for when reviewing ReadLogs output.Log File analyzer agrees to use the external monitor together to help us identify the causes of IIS conflicts or oth
A simple example of IIS log import.The sample source code is at the end of this article.
1. log format.Note: The first four rows can be filtered by default.
The default IIS log column Delimiter is space.
Download Sample Code
A powerful tool is recom
File Location: C:\WINDOWS\system32\LogFiles\HTTPERR\httperr1.log
I. Description of the problem
The previous normal ASP Web site is not open today, the site is deployed under IIS. Displays "Connections_refused" by looking for IIS log file "Httperr.log" information
Ii. Solutions
Searching for information on the Web,
Many people have used IIS servers. However, many people have been attacked, here we will explain some small experiences we have summarized over the years to help you better use IIS servers. Next, let's explain how to prevent the attacks.
Protecting IIS server log security
Logs are an important part of the system secu
1, install log Parser 2.2https://www.microsoft.com/en-us/download/details.aspx?displaylang=enid=24659https://gallery.technet.microsoft.com/Log-Parser-Studio-cd458765 Download and then unzip2. Run Log Parser StudioRun LPS.exe in the previously unzipped Lpsv2.d1 folder.3. Specify the IIS
code, 200 for success, 403 for no permissions, 404 for the page not found, specify below.Sc-substatus: Protocol sub State, logging HTTP child status code.Sc-win32-status:win32 status, log the Windows status code, and refer to the description of the log "Sc-win32-status--win32 status details in IIS", which was sent in the Chxwei blog.Sc-bytes: The number of bytes
stream. You can see the details in the heap and stack conflicts.Note that the command at the top of the stack does not list the invocation commands When the file is not loaded with symbols. When the stack is loaded to ReadLogs, it tries to break down this function call into a friendly name by using the list of loaded modules. First, it obtains the memory address for calling (0x1000113c), and then looks for the DLL containing the memory address.! Inetdbg. mod An extension added to the CDB by the
1. Open the IIS log file
2. View the location of the log file
3 File address found
The default will be in C:\inetpub\logs\LogFiles (Win7), which will have a series of file names, similar to W3SVC file name.IIS log files are stored inside
Use Note:
To modify the absolute path of the IIS log in the iis.php file
For example: $folder = "c:/windows/system32/logfiles/site log directory/"; Be sure to bring a slash (/) in the back.
(with virtual space do not understand the absolute path of your site to see?) Upload a probe!
Direct Check view: http://site domain name/iis.php
Local view: To download the
For a seor, the server IIS log is a very important optimization reference log, because we can see the search engine spider crawling situation, and also can understand the site itself some of the situation, can also be analyzed to some users of the channel, Not necessarily to use some Third-party code to do statistics, of course, some
Because of the monitoring needs of the server often generate a lot of log files, such as IIS log files (C:\inetpub\logs\LogFiles), a slightly traffic web site, its log can reach hundreds of megabytes per day, these files accumulate a serious occupation of server disk space. It is necessary to remove them periodically.
1. Some basic knowledge about Windows logsWindows 2000 log files usually contain application logs, security logs, system logs, DNS server logs, FTP logs, and WWW logs, which may vary depending on the services enabled on the server, different log types have different storage locations:Default location of application logs, security logs, system logs, and DNS logs: % SystemRoot % \ system32 \ configThe default
More common analysis information(Prepared by qingapple studio)This section discusses the different outputs that you may see in log files, how they will help you debug applications, and how to make them more effective.When you look at the raw logs generated by the IIS debugger, you will notice that there are many lines before you reach the access conflict in the log
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.