Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Report on Internet Information Services (IIS)

Category: Computer Sciences Paper Type: Report Writing Reference: IEEE Words: 6050

Internet Information Services or IIS is basically a web server which developed by the hi-tech Microsoft company to be used with the Window Server. The server itself designed for a variation of hosting utilization, while at the same time, also attempting to preserve the best level of both flexibility and also scalability as well. Internet Information Services or IIS is incorporated with various categories of log files. The formats of the entire log files will provide valuable information related with the websites and also specific data, which included as well the Internet Protocol or IP addresses, information of the user, and also detail of site visit which covers updates, times, and certain queries. When it is accurately analyzed, the Internet Information Services or IIS will deliver an appropriate information regarding demographics along with the usage of the IIS web server. Tracking down the usage of data will enable the web providers to better modify their services to assist particular regions, IP ranges, or time frames. In addition to this, the log filters also has the capability to enable the providers to only tracking the essential data meant for analysis. The research coves up all the definition of ISS, the importance of the Internet Information Services logs, what kind of issue related to the Internet Information Services, the security tools related with the IIS logs, along with the recommendations for the future usage of the Internet Information Services Log files.

1.      Introduction of Internet Information Services (IIS)

Microsoft Internet Information Services or IIS servers have turned out to become one of the essential things to support the businesses in these modern days. On the other hand, it is a duty of an Information Technology security does not stop with only setting up the servers of Internet Information Services. In fact, right after the deployment processes, the administrators need to foster the measures of security, in order to secure and protect all of those servers. Up till now, the most proven method which enables us to monitor the security of Internet Information Services servers is by installing a log management tool that has a great capability to provide the finest support for the Internet Information Services logs [1].

The Internet Information Services or IIS provides a request-processing structure which integrates:

·         The Windows Process Activation Service or WAS, this will enable the websites to utilize the protocols further than HTTP and also HTTPS.

·         A Website server engine that able to be modified by both adding and eliminating some components.

·         Incorporated request-processing pipelines from the Internet Information Services, as well as ASP. NET.

In brief, for all of the hard work that the Web server has filled by, along with the Web site content, the final reckoning is hidden inside the accumulating files that filed down the number of visitors to a Website. This is where the IIS Log files contribute its role, in which breaking all of them, with a purpose to do the analysis will provide valuable information or data. For this reason, no matter in which type of business, every single company that using the Internet can get the benefit from using the Internet Information Services Logs from Microsoft. The reason behind this is due to the fact that, once a company setting up its website on IIS and also enable for the logging, then the server will immediately note down a log statement to a log file at the time when an HTTP transaction will be appeared [2].

Microsoft has established the Internet Information Services or ISS which also equipping it with the best logging capability that could make it easier for the Web developers in the context of solving the bug issues that have been all the times come up inevitably. Either the error is related to the modification requirement toward the server configuration of Internet Information Services, or else, an issue that related with the modification requirement toward the application code itself, the Internet Information Services has a great capability to support in providing some useful errors, with a purpose to indicate the main cause of the issue to have appeared.

2.      Problem Statement of Internet Information Services (IIS)

Almost all of the companies in this growing technology always want to make sure that their business activities will always up-to-date with the latest trends in the usage of their Web server. Once the Internet Information Services logging has turned on, then it will typically store every single thing from the specific website pages that were requested to the denoting URLs toward the IP addresses of the users' browsers to access the official website of a company. The main problem with this type of method is that, the raw log files consist excessive data that might unable to be understood by the human. As a consequence, a log-file analysis program has developed to resolve this issue. For this, the companies need to understand properly the definition of Internet Information Services logs and all the benefits provided by IIS for the business as well.

3.      Aims and objectives of Internet Information Services (IIS)

This research was conducted with the following aims and objectives below:

·         To understand the importance of the Internet Information Services Logs for the business or Web servers

·         To identify some issues related to the Internet Information Services Log files

·         To recognize the options of security tools related to the Internet Information Services

·         To provide proper guidance for future research related to the Internet Information Services

4.      Organization of the paper of Internet Information Services (IIS)

            The paper starts with the introduction part which aims to describe the topic properly. Right after the introduction part, the paper will be followed by the part of results & discussion gained from the valid and authentic resources related to the topic of the research itself which is the Internet Information Services Log files. Following this part, the paper will continue with describing the security tools, along with each of tool’s function and feature. The next part included in this paper is the methodology part, which will describe the theory related to the research topic. Following the methodology, some recommendations will be provided, along with the conclusion to complete the research.

5.      Overview of the Internet Information Services Log files

            As we have acknowledged, the log files generated by the Internet Information Services will definitely consume the massive amount of disk space with the passage of time. In fact, logs have the capability to potentially fill up the whole drive. In order to solve this issue, a number of users has decided to turn off the logging completely. Providentially, there are some other better options for the users to solve this issue such as mentioned below:

1.      Enabling the folder compression

2.      Removing the log folder to a remote system

3.      Delete some of the old log files by using script

4.      Delete some of the old log files by using the IIS Log File Cleaner

In addition to this, there are also some other alternatives to manage the usage of disk such as:

·         Create some separate logs to arrange the websites and applications

·         Limit the size of log by overlooking unnecessary property fields

·         Maintain the sources of memory by utilizing a centralized binary logging

5.1  Enabling the Folder Completion of Internet Information Services (IIS)

The Internet Information Services Log files compress to roughly 2% of their actual size. This is the main reason for the users to enable the folder compression which is an easy and simple method to lower the usage of disk. However, this method cannot be considered as a final solution due to the usage of disk will definitely keep on growing throughout the time, and might eventually load up the hard drive as well. To be noted, it might take some time for the computer to compress the entire content in case if the folder has been containing a huge amount of data. Another important thing to remember is that, during the first compression process, the computer might get slower [3].


Source: https://docs.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/managing-iis-log-file-storage

5.2  Removing the log folder to a remote system

The Internet Information Services Log files are stored by default in the IIS server folder. This folder is organized within the Directory property which placed on the Logging page for both a personal website and also the server as well. In order to decrease the issue of log disk usage, the users could remove the Internet Information Services Log files to another folder, or else, on another server which still has some space, either in the local Internet Information Services server, or maybe in a different domain. This alternative solution will able to help the security of the system as well, due to the fact that, if there will be a crash on a local hard drive, then the log data will still be available to be found on the remote storage. Besides this, the log files also can be consumed by the analysis system as well [3].


Source: https://docs.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/managing-iis-log-file-storage

 

Source: https://docs.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/managing-iis-log-file-storage

5.3  Delete some of the old log files by using script

Running a script that will automatically delete some of the old log files is also one of the best and simple method for the users to manage the disk usage of log files. In fact, by running a script in a planned task will enable the users to make sure that there will be no issue of a disk load, and manage it without requiring any consistent maintenance. One of samples for the script to be used in managing the disk usage is as below:


Source: https://docs.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/managing-iis-log-file-storage

            Using a script to delete the log files is considered as a reliable, long term solution to solve the issue regarding the disk space consuming [3].

5.4  Delete some of the old log files by using the IIS Log File Cleaner

The IIS Log File Cleaner is basically a simple tool designed especially for sanctioning a log retention policy for the Internet Information Services. This type of tool will run in the background for once in each hour, with a purpose to automatically clean up the IIS log folder, and at the same time, also deleting some old files which are already older than a maximum age (depends on your setting). Then the log file will be removed to the Recycle bin, with a purpose to prevent the possible data loss. The users also able to perform this cleaning procedure manually, as well as pausing the automated procedure [3].

6.      Some issues related to the Internet Information Services Log files

            In this digital world, a number of network administrators have been encountering severe intrusions related to the Web server, which have lead some legal actions as the consequence. Every so often, the Internet Information Services Logs have turned out to become the main evidence applied to track down the intruders on the Web server. In fact, there are hundreds of megabytes of log file evidence that immediately has turned out to become useless only because of a single blank line. In addition to this, due to the fact that the log files were saved and stored on the same Web server that was conceded, then the intruder will be easily removed or vanished the evidence, or even worst, replace the evidence with another error evidence pointing to another web server. Thus, the medication of a log file is a quite convincing reason to doubt the legitimacy of each log file on that same web server. The users would have to provide some convincing arguments to prove the credibility of the log files, to make sure that they are reliable and trustworthy as evidence. For this, the users must take some measures that will able to protect the authenticity, accuracy, along with accessibility of their Internet Information Services Log files [4].

Below are some issues related to the Internet Information Services Log files, and also the method to solve them.

6.1  Accuracy of Internet Information Services (IIS)

            Accuracy simply means that your log file data really presents all of the activity on the Web server. This has been considered as a serious issue due to the fact that even the smallest inaccuracy might be able to bring into doubt on the legitimacy of the complete set of data. To make sure that the accuracy of the data, the users can do some following steps such as mentioned below [4]:

·         Log everything

The users need to configure their Internet Information Services Logs to record every single field that available. Despite the fact that some admins view only little value in storing this additional data, every single field acquires certain significance in a forensic examination. Moreover, gathering the whole information around the visitors of a website could really help in detecting any type of attack which derived from a particular computer system, or else, logged in user.

·         Keeping time

The users need to synchronize the Internet Information Services servers with an external time source using the service of the Windows Time. In case if the user uses a specific domain, then the time service will be synchronized automatically to the domain director.

·         Apply several sensors

It will be quite difficult to invalidate a log entry, in case if there are two separate devices will only record similar information. Thus, by assimilating logs from various devices, then it is a great potential for the users to strengthen the real value of every single log.

·         Prevent the missing logs

Another issue in the Internet Information Services Logs is that, in case if the server will not get any hits within 24 hours, then there will be no log file to be created. On the other hand, if there is no log file existing, then there is no possibility to figure out whether the Web server gets any hits or whether the log file has eventually get deleted. Thus, to prevent this type of issue, the users need to make sure that there will always be a log.

6.2  Authenticity of Internet Information Services (IIS)

Log files can be considered as authentic ones if the users could approve that there have no any modification made for the log files. The fact that the Internet Information Services Log files are basically simple text files that could be modified easily has made the assumption that the Internet Information Services Log files cannot be approved as the authentic ones. However, there are some methods to remedy this issue such as mentioned below [4].

·         Move the Logs

To start the step in making sure the log files to be authentic, and they have never been modified, the users could simply move the Internet Information Services Logs off the Website server. In case if the Web server has been conceded, then the users should consider that the same thing also can be applied to the log files as well. All they have to do is move the logs and place them on a master server, then again move them to a CD, tape, or any device as soon as possible.

·         Encryption, signatures, and checksums

The best and only method to be completely sure that a log file has never been modified is to encrypt and also sign the logs by using some public-key encryption structure. The file signatures will be really helpful since at the tome if there is any file is despoiled, then it will not invalidate the rest or the entire logs.

·         Make sure for the integrity of system

The users must be, every so often, make sure to keep up-to-date on the hotfixes and service packs, with a purpose to make sure as well the validity of their system files.

7.      How to read and also customize the Internet Information Services Log Files

            The web server of Internet Information Services from Microsoft utilizes an extraordinary format of file that appears to be hardly ever seen. The format of file that has been used by the Internet Information Services from Microsoft appears to be a space-delimited format, and also consist of some comments in them. In order to interpret properly the Internet Information Services Logs format, then the users need to understand some essential things such as [5]:

·         The Internet Information Services might write various separate files by the hour, by day, and also by the Internet Information Services site

·         The comments are represented with the lines that begin with a #

·         In each time the Internet Information Services restart, then it will write to the log file the recent version, fields, and also date

·         The format file is formed in a space-delimited type of format

·         The fields that acquire no value will present a dash (-) due to the fact that spaces are not permitted

Below is a sample of what an Internet Information Services log file’s output looks.


Source: https://stackify.com/how-to-interpret-iis-logs/

8.      Customization of the Internet Information Services Log files

The Internet Information Services provides some various settings designed for the users to customize their Internet Information Services log files inside the Internet Information Services manager support. The users could log the files within the default W3C formation, or else, utilizing the Internet Information Services, or some other file formats customization. This will enable the users to specify the rollovers of the log files, and also determining is any new file is produced hourly, daily, weekly, monthly, etc. In addition to this, the users also are able to specify the maximum size of the file. Furthermore, the users also able to customize the fields that are being logged, removing certain fields that they might not need, selecting from various optional fields, and the users even able to create their own field as well. To be noted, the custom fields must be values that are obtainable within the HTTP headers or else from the server variables.

9.      How to read the Internet Information Services log files with Microsoft’s Log Parser Studio

            In case if the users desire to open up the Internet Information Services log files within the log file viewer, then it is suggested to the users to use any free device such as Log Parser Studio which established by Microsoft. Here are the steps that the users need to follow, in order to read the Internet Information Services log files with using the support of Microsoft’s Log Parser Studio [5]:

·         Firstly, select File > New Query

·         Then select where are the log files

·         Next, set up the type of log in IISW3CLOG


Source: https://stackify.com/how-to-interpret-iis-logs/

            If the users have made it in specifying the location of a log file along with the type of logs, then the users could query their Internet Information Services log files. A simple for a basic query that can be started by the users are such as:

Source: https://stackify.com/how-to-interpret-iis-logs/

            With using the support of this Log Parser Studio, the users are also able to export the entire data to a type of CSV file, which able to be used through Excel or some other devices.


Source: https://stackify.com/how-to-interpret-iis-logs/

10.  Analyze and interpret the Internet Information Services log files with using the log management

            Another option for the users who want to get the best of their Internet Information Services log files is that, they need to aggregate the entire files inside a log management service. These devices will able to support the users to view and query them in actual time, whole across the web servers.

Here are some benefits provided by aggregating the Internet Information Services log files with log management [5]:

·         A complete search across the entire servers

·         Log data archival

·         Monitor any potential issues that might be appeared at logs

·         Provide easy access to Information Technology or IT

11.  The Benefits of Centralizing the Internet Information Services Log Files into a Unified view

The Internet Information Services log files are stored in various and different locations and directories. In addition to this, Internet Information Services are stored in different locations based on the varied versions of which type of Internet Information Services that being used by the users. In reality, it is not a surprising fact if the business users will have some different versions of the Internet Information Services inside their organization. In addition to this, the various cloud has also been offering Internet Information Services to save its log files in some different locations. This definitely has to add the complexity of the users in managing these entire files for troubleshooting, as well as to monitor the web-based applications [6].

In order to solve this issue, the users could maximize the value of the Internet Information Services log files by centralizing those files into one unified dashboard that will be functioned across versions of the Internet Information Services, and also the settings of hybrid cloud. This method will definitely deliver some benefits such as mentioned below:

a.      Immediate comparisons of Internet Information Services (IIS)

One single dashboard designed for viewing the Internet Information Services log file metrics has the capability to allow for immediate comparisons between the applications along with their performances. With this, the business users could measure how the practice of an application will affect the performance of another application, as well as some other types of networking issues. It will be more complicated if the users will use the ready metrics of comparison and then identify the trends that appear in the application usage and also the performance when the Internet Information Services log data is stored in some various locations.

b.      Real-time analytics of Internet Information Services (IIS)

A centralized dashboard designed for searching at the Internet Information Services log files is considered to be a great method for some of the improved, real-time analytics that supports in providing the type of data both immediately and also presented in long-term value. Real-time analytics of the Internet Information Services log file data also has the potential role in monitoring any issues related to cybersecurity, which will enable the business users to reduce the amount of data breaches appearances and also the damage that they will cause.

c.       Alerts and consistent monitoring of Internet Information Services (IIS)

Assembling the Internet Information Services log files into an exclusive dashboard is quite fundamental for consistently monitoring the data, which is specifically essential with enduring, event-based data normally of a number of website applications. For this reason, it will be further practical to apply this consistent monitoring of the Internet Information Services log files if all of the files are centralized in a single exclusive dashboard instead of the files that will be scattered around the various different directories and places.

Centralizing the Internet Information Services log files for consistent monitoring will also really help in issuing certain alerts, with a purpose to create not just based on the personal applications and aspects, but also on the entire combinations of them as well. The action that will be performed and derived from an alert is considered to be more effective in case if it is based on the consistent monitoring of the entire Internet Information Services log files.

12.  The Modules included in the Internet Information Services or IIS

The Internet Information Services contains various modules that present fundamental functions designed for the application along with the functions of web server. Every single module that consisted of Internet Information Services has its own responsibilities. For, example, a responsibility to listen for any type of request that sent to the server, a responsibility to manage the process, and also a responsibility to read the configuration files as well. All of these modules also include the protocol listeners mentioned such as HTTP.sys, in addition to the services such as the Windows Process Activation Service or WAS and also the World Wide Web Publishing Service.

13.  Security tools of Internet Information Services (IIS):

Microsoft ‘s IIS web server is used as many problem solvers in the network using and it is being considered as most popular software in today business market. As it is being considered that the software is used to share on web-content. While using a network it is necessary to check that the server is covered with strong security. All the information and data on the IIS web server logs which could be access by user activity and errors on the security basis. For the security measures of the IIS logs it should cover with proper system of the network which could be measures in efficient manner. It could be configured by the website which could be control by the different security VPN which are used to troubleshoot the potential website used to resolve the issues of the IIS logs software. The information related to use the security of the software so that it could be used to save the information on the IIS software network. There are many software which could be used to secure the data on the website one of the best software are used for this purpose (C. Gkantsidis, Karagiannis, & VojnoviC, 2006).

13.1 Webroot of Internet Information Services (IIS)

Webroot secures the software as an Antivirus which delivers the data with security and faster and effective way which protect the files and keep them up to date. It saves the files from conflict with other security programs and gives a secure program for the file. It also identifies the protection against the security threats which are connected with different apps and attack on the files which are secured in the PC. These are also used to scan the files with maximum speed and do not create distortion in the networking or performing a specific task. Webroot is considered as one of the best antivirus software among the others therefore it is used in IIS logs to protect the data from hacking and stealing (C. P. Jefferies, 2010).

·         Features of Internet Information Services (IIS)

There are different features which are used to treat the security of the data on PC to protect the files and to overcome the deficiency of consistency of the work. There are some features of webroot which are explained below:

·         It helps to block virsus of different kinds such as Trojans, spyware, rootkit and many other malware threat in the application of software.

·         It is lightest and fastest antivirus software which scans whole PC within just 2 to 3 minutes.

·         It stops the unfamiliar factors which could be based on the suspicious flow of the software about which there may be suspicious about the performance of the work.

·         Webroot is most likely to update the new version automatically and you don’t have to download it by yourself.

·         When it is set once the scan runs automatically according to the set schedule which increase its efficiency.

·         It fights against spyware, rootkit and other viruses for the security.

·         Functions of Internet Information Services (IIS)

There are also functions which are performed by the webroot antivirus in the security of the data or information lying in the PC. Functions of webroot includes:

·         It calculates the new agent of files which needs to calculate in figures or tables

·         It also connects with the bug fixes which are used to support for edge browsing in the browser.

·         It enhance the efficiency of the work when it relates to the working with specific applications.

·         It might be reason of image improvement in the PC which produce high quality images.

·         It’s used to get the backup of data with the retained setting with the logging with different users.

·         It compares with the compatibility of other software which are used in the detection of the virus.

13.2 Flowmon of Internet Information Services (IIS)

Flowmon is network intelligence interest which integrate the Netops and secOps into one solution. It has the capability of monitoring the files and automatic function of monitoring the threat detection. It generates the strong foundation of information technology which is being processed by the network to overcome the noise in the apps. It helps to work on PC for professional expertise which are necessary to done with the different impact and magnitude of the basic cause of defect. Flowmon is considered as answer of all the questions which are arise in the monitoring of the information technology. It deals with the performance issues regarding the unavailability of any data which is used in any application. It provides a set of operations with deep understandings which are helpful to understand the issues according to the situation. The functions of flowmon is totally based on the performance of the as it is widely used by the large scale companies to secure their data which they use for data security. It assist the application to eliminate the threat activity which could attack on the PC through bypass (A. Kamisiński & Fung, 2015).

·         Features of Internet Information Services (IIS)

The flowmon is considered as one of the best software which is used by the large scale business organization to secure their files. It has different features explained below:

·         Flowmon works with more visibility as compared to other antivirus networks in the computer networks.

·         It diagnose configuration in operational activities which is tough task to perform while detecting virus in the files.

·         Flowmon has the quality of quick troubleshoot the problems detected in the specific task.

·         It works as proactive detection of threats which are used in the fighting of firewalls against the viruses.

·         It also capable to improve business performance with the increase of user experience of a specific application.

·         Functions of Internet Information Services (IIS)

Flowmon is performing functions in application of computer as antivirus software which protect the files to being discarded or wasted by the virus. Some of its functions are discussed here:

·         It is used to save the files lies on the PC of business and give access to the set schedule.

·         Flowmon is used to increase the efficiency of the business which related to the increase in the profit maximization.

·         It enhances the efficiency of the work when it relates to the working with specific applications.

·         It’s used to get the backup of data with the retained setting with the logging with different users

The IIS logs is secured by these software which are used to increase the work reliability of the organization.

14.  Methodology of Internet Information Services (IIS)

IIS site for the Microsoft Internet Information Service (IIS) which is used to keep the files on PC with complete security. It is used to record the different entries which is used in the daily user activity in different sever usage. IIS log helps you to control the targeted point which is used to secured, record and troubleshoot the problems which could be relates to the websites and other network of data recording using a PC. For instance, you can use the files of data to make sure that whether it is based on some events. The files in the IIS log are the easy source to be attacked by the virus but it could be saved by using security tools for the safety of data. As concerned to security tools of the IIS log these are discussed above in this report such as webroot and flowmon. Webroot secures the software as an Antivirus which delivers the data with security and more fast and effective way which protect the files and keep them up to date. It saves the files from conflict with other security programs and gives a secure program for the file as well as Flowmon is network intelligence interest which integrate the Netops and secOps into one solution. It has the capability of monitoring the files and automatic function of monitoring the threat detection. It generates the strong foundation of information technology which is being processed by the network to overcome the noise in the apps. Both are used for the security of the data in IIS logs.

IIS could save the data in lay in different files which are already set in sequence and scheduled according to the automatic way that it could access the data and stored in the computer with the help of security tools to save it from viruses. The files in the IIS logs are formatted in the type which are preferred to arrange in a system which is confirmed by the useful analysis of the security measures which are required to perform the security of the files in computer. User could customize his data in IIS logs which are extended in different formats according to the properties of the data. In the functions of IIS logs there is different methods which are used to record the data such as it used IP address of the data which is running with the proxy web development against the other threats of the IP address. There may be further feature of user name which could be only accessed by the server. If there is any attempt by the unauthorized person there will be proper authentication which will not allow the person to access the information. The action which is used by the client to get the post is known as post command. The user could get the HTML and CGI program which is most commonly used by the computer users (L. Y. Yao & Xiong, 2009). It helps the agent to access the browser with user name of the user after completing all the requirements of security measures in the recording of data. While enabling the IIS logs following method are used:

·         Start the internet information service on your computer.

·         Enter server name and confirm the website which must be connected with FTP site which you want to enable in the properties of the IIS.

·         Click on website to enter FTP site on the tab of search.

·         Start with the enabling logging in the box you have given.

·         Use active format or whatever you want to choose according to the characteristics of data which you want to record.

If you are using general tab you would run the files with the click of general tab and create a table to log new files in IIS, but if you are using local website you have only click on local file naming rollover and enter your data.

15.  Conclusion and Recommendations of Internet Information Services (IIS)

In the modern days, Microsoft Internet Information Services or IIS servers have turned out to be one of the essential things to support the businesses in these modern days.

In brief, for all of the hard work that the Web server has filled by, along with the Web site content, the final reckoning is hidden inside the accumulating files that fill down the number of visitors to a Website. This is where the IIS Log files contribute its role, in which breaking all of them, with a purpose to do the analysis will provide valuable information or data.

It is recommended that companies need to understand properly the definition of Internet Information Services logs and all the benefits provided by IIS for the business as well.  They should understand the importance of the Internet Information Services Logs for the business or Web servers. The businesses should have the ability to identify some issues related to the Internet Information Services Log files along with recognizing the options of security tools related to the Internet Information Services. It will better help the firms to generate huge profits as well as the current research will provide proper guidance for future research related to the Internet Information Services.

References of Internet Information Services (IIS)

[1]

A. Zambelli, "IIS smooth streaming technical overview," Microsoft Corporation, p. 40, 2009.

[2]

T. Titus, "Getting Started with the IIS Manager in IIS," 16 November 2007. [Online]. Available: https://docs.microsoft.com/en-us/iis/get-started/getting-started-with-iis/getting-started-with-the-iis-manager-in-iis-7-and-iis-8.

[Accessed November 2019].

[3]

J. v. d. Erve, "Managing IIS Log File Storage," 30 May 2014. [Online]. Available: https://docs.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/managing-iis-log-file-storage.

[Accessed November 2019].

[4]

M. Burnett, "Maintaining Credible IIS Log Files," 12 November 2002. [Online]. Available: https://www.symantec.com/connect/articles/maintaining-credible-iis-log-files.

[Accessed November 2019].

[5]

M. WATSON, "How to Read & Customize IIS Log Files," 14 May 2017. [Online]. Available: https://stackify.com/how-to-interpret-iis-logs/.

[Accessed November 2019].

[6]

Sumologic.com, "Where are IIS Log Files?," 10 May 2019 . [Online]. Available: https://www.sumologic.com/blog/iis-log-files-location/.

[Accessed November 2019].

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed