1.
Introduction
of Internet Information Services (IIS)
Microsoft
Internet Information Services or IIS servers have turned out to become one of
the essential things to support the businesses in these modern days. On the
other hand, it is a duty of an Information Technology security does not stop
with only setting up the servers of Internet Information Services. In fact,
right after the deployment processes, the administrators need to foster the
measures of security, in order to secure and protect all of those servers. Up
till now, the most proven method which enables us to monitor the security of
Internet Information Services servers is by installing a log management tool
that has a great capability to provide the finest support for the Internet
Information Services logs [1].
The
Internet Information Services or IIS provides a request-processing structure
which integrates:
·
The Windows Process Activation Service
or WAS, this will enable the websites to utilize the protocols further than
HTTP and also HTTPS.
·
A Website server engine that able to be
modified by both adding and eliminating some components.
·
Incorporated request-processing
pipelines from the Internet Information Services, as well as ASP. NET.
In
brief, for all of the hard work that the Web server has filled by, along with
the Web site content, the final reckoning is hidden inside the accumulating
files that filed down the number of visitors to a Website. This is where the
IIS Log files contribute its role, in which breaking all of them, with a
purpose to do the analysis will provide valuable information or data. For this
reason, no matter in which type of business, every single company that using
the Internet can get the benefit from using the Internet Information Services
Logs from Microsoft. The reason behind this is due to the fact that, once a
company setting up its website on IIS and also enable for the logging, then the
server will immediately note down a log statement to a log file at the time
when an HTTP transaction will be appeared [2].
Microsoft
has established the Internet Information Services or ISS which also equipping
it with the best logging capability that could make it easier for the Web
developers in the context of solving the bug issues that have been all the
times come up inevitably. Either the error is related to the modification
requirement toward the server configuration of Internet Information Services,
or else, an issue that related with the modification requirement toward the
application code itself, the Internet Information Services has a great
capability to support in providing some useful errors, with a purpose to
indicate the main cause of the issue to have appeared.
2.
Problem
Statement of
Internet Information Services (IIS)
Almost
all of the companies in this growing technology always want to make sure that
their business activities will always up-to-date with the latest trends in the
usage of their Web server. Once the Internet Information Services logging has
turned on, then it will typically store every single thing from the specific
website pages that were requested to the denoting URLs toward the IP addresses
of the users' browsers to access the official website of a company. The main
problem with this type of method is that, the raw log files consist excessive data
that might unable to be understood by the human. As a consequence, a log-file
analysis program has developed to resolve this issue. For this, the companies
need to understand properly the definition of Internet Information Services
logs and all the benefits provided by IIS for the business as well.
3.
Aims
and objectives of
Internet Information Services (IIS)
This research was conducted with
the following aims and objectives below:
·
To understand the importance of the
Internet Information Services Logs for the business or Web servers
·
To identify some issues related to the
Internet Information Services Log files
·
To recognize the options of security
tools related to the Internet Information Services
·
To provide proper guidance for future
research related to the Internet Information Services
4.
Organization
of the paper of
Internet Information Services (IIS)
The paper starts with the
introduction part which aims to describe the topic properly. Right after the
introduction part, the paper will be followed by the part of results &
discussion gained from the valid and authentic resources related to the topic
of the research itself which is the Internet Information Services Log files.
Following this part, the paper will continue with describing the security tools,
along with each of tool’s function and feature. The next part included in this
paper is the methodology part, which will describe the theory related to the
research topic. Following the methodology, some recommendations will be
provided, along with the conclusion to complete the research.
5.
Overview
of the Internet Information Services Log files
As we
have acknowledged, the log files generated by the Internet Information Services
will definitely consume the massive amount of disk space with the passage of time.
In fact, logs have the capability to potentially fill up the whole drive. In
order to solve this issue, a number of users has decided to turn off the
logging completely. Providentially, there are some other better options for the
users to solve this issue such as mentioned below:
1. Enabling
the folder compression
2. Removing
the log folder to a remote system
3. Delete
some of the old log files by using script
4. Delete
some of the old log files by using the IIS Log File Cleaner
In
addition to this, there are also some other alternatives to manage the usage of
disk such as:
·
Create some separate logs to arrange
the websites and applications
·
Limit the size of log by overlooking
unnecessary property fields
·
Maintain the sources of memory by
utilizing a centralized binary logging
5.1 Enabling the Folder Completion
of Internet Information Services (IIS)
The
Internet Information Services Log files compress to roughly 2% of their actual
size. This is the main reason for the users to enable the folder compression
which is an easy and simple method to lower the usage of disk. However, this
method cannot be considered as a final solution due to the usage of disk will
definitely keep on growing throughout the time, and might eventually load up
the hard drive as well. To be noted, it might take some time for the computer
to compress the entire content in case if the folder has been containing a huge
amount of data. Another important thing to remember is that, during the first
compression process, the computer might get slower [3].
Source: https://docs.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/managing-iis-log-file-storage
5.2 Removing the log folder to a remote
system
The
Internet Information Services Log files are stored by default in the IIS server
folder. This folder is organized within the Directory property which placed on
the Logging page for both a personal website and also the server as well. In
order to decrease the issue of log disk usage, the users could remove the
Internet Information Services Log files to another folder, or else, on another
server which still has some space, either in the local Internet Information
Services server, or maybe in a different domain. This alternative solution will
able to help the security of the system as well, due to the fact that, if there
will be a crash on a local hard drive, then the log data will still be available
to be found on the remote storage. Besides this, the log files also can be
consumed by the analysis system as well [3].
Source: https://docs.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/managing-iis-log-file-storage
Source: https://docs.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/managing-iis-log-file-storage
5.3 Delete some of the old log files by
using script
Running
a script that will automatically delete some of the old log files is also one
of the best and simple method for the users to manage the disk usage of log
files. In fact, by running a script in a planned task will enable the users to
make sure that there will be no issue of a disk load, and manage it without
requiring any consistent maintenance. One of samples for the script to be used
in managing the disk usage is as below:
Source:
https://docs.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/managing-iis-log-file-storage
Using a script to delete the log
files is considered as a reliable, long term solution to solve the issue
regarding the disk space consuming [3].
5.4 Delete some of the old log files by
using the IIS Log File Cleaner
The
IIS Log File Cleaner is basically a simple tool designed especially for
sanctioning a log retention policy for the Internet Information Services. This
type of tool will run in the background for once in each hour, with a purpose
to automatically clean up the IIS log folder, and at the same time, also
deleting some old files which are already older than a maximum age (depends on
your setting). Then the log file will be removed to the Recycle bin, with a
purpose to prevent the possible data loss. The users also able to perform this
cleaning procedure manually, as well as pausing the automated procedure [3].
6.
Some
issues related to the Internet Information Services Log files
In this digital world, a number of
network administrators have been encountering severe intrusions related to the
Web server, which have lead some legal actions as the consequence. Every so
often, the Internet Information Services Logs have turned out to become the
main evidence applied to track down the intruders on the Web server. In fact,
there are hundreds of megabytes of log file evidence that immediately has
turned out to become useless only because of a single blank line. In addition
to this, due to the fact that the log files were saved and stored on the same
Web server that was conceded, then the intruder will be easily removed or
vanished the evidence, or even worst, replace the evidence with another error
evidence pointing to another web server. Thus, the medication of a log file is
a quite convincing reason to doubt the legitimacy of each log file on that same
web server. The users would have to provide some convincing arguments to prove
the credibility of the log files, to make sure that they are reliable and
trustworthy as evidence. For this, the users must take some measures that will
able to protect the authenticity, accuracy, along with accessibility of their
Internet Information Services Log files [4].
Below
are some issues related to the Internet Information Services Log files, and
also the method to solve them.
6.1 Accuracy of Internet Information Services (IIS)
Accuracy simply means that your log
file data really presents all of the activity on the Web server. This has been
considered as a serious issue due to the fact that even the smallest inaccuracy
might be able to bring into doubt on the legitimacy of the complete set of
data. To make sure that the accuracy of the data, the users can do some following
steps such as mentioned below [4]:
·
Log everything
The
users need to configure their Internet Information Services Logs to record
every single field that available. Despite the fact that some admins view only
little value in storing this additional data, every single field acquires
certain significance in a forensic examination. Moreover, gathering the whole
information around the visitors of a website could really help in detecting any
type of attack which derived from a particular computer system, or else, logged
in user.
·
Keeping time
The
users need to synchronize the Internet Information Services servers with an
external time source using the service of the Windows Time. In case if the user
uses a specific domain, then the time service will be synchronized
automatically to the domain director.
·
Apply several sensors
It
will be quite difficult to invalidate a log entry, in case if there are two
separate devices will only record similar information. Thus, by assimilating
logs from various devices, then it is a great potential for the users to
strengthen the real value of every single log.
·
Prevent the missing logs
Another
issue in the Internet Information Services Logs is that, in case if the server
will not get any hits within 24 hours, then there will be no log file to be
created. On the other hand, if there is no log file existing, then there is no
possibility to figure out whether the Web server gets any hits or whether the
log file has eventually get deleted. Thus, to prevent this type of issue, the
users need to make sure that there will always be a log.
6.2 Authenticity of Internet Information Services (IIS)
Log
files can be considered as authentic ones if the users could approve that there
have no any modification made for the log files. The fact that the Internet
Information Services Log files are basically simple text files that could be
modified easily has made the assumption that the Internet Information Services
Log files cannot be approved as the authentic ones. However, there are some
methods to remedy this issue such as mentioned below [4].
·
Move the Logs
To
start the step in making sure the log files to be authentic, and they have
never been modified, the users could simply move the Internet Information
Services Logs off the Website server. In case if the Web server has been
conceded, then the users should consider that the same thing also can be
applied to the log files as well. All they have to do is move the logs and
place them on a master server, then again move them to a CD, tape, or any
device as soon as possible.
·
Encryption, signatures, and checksums
The
best and only method to be completely sure that a log file has never been
modified is to encrypt and also sign the logs by using some public-key
encryption structure. The file signatures will be really helpful since at the
tome if there is any file is despoiled, then it will not invalidate the rest or
the entire logs.
·
Make sure for the integrity of system
The
users must be, every so often, make sure to keep up-to-date on the hotfixes and
service packs, with a purpose to make sure as well the validity of their system
files.
7.
How to
read and also customize the Internet Information Services Log Files
The web server of Internet Information
Services from Microsoft utilizes an extraordinary format of file that appears
to be hardly ever seen. The format of file that has been used by the Internet
Information Services from Microsoft appears to be a space-delimited format, and
also consist of some comments in them. In order to interpret properly the
Internet Information Services Logs format, then the users need to understand
some essential things such as [5]:
·
The Internet Information Services might
write various separate files by the hour, by day, and also by the Internet
Information Services site
·
The comments are represented with the
lines that begin with a #
·
In each time the Internet Information
Services restart, then it will write to the log file the recent version,
fields, and also date
·
The format file is formed in a
space-delimited type of format
·
The fields that acquire no value will
present a dash (-) due to the fact that spaces are not permitted
Below
is a sample of what an Internet Information Services log file’s output looks.
Source:
https://stackify.com/how-to-interpret-iis-logs/
8.
Customization
of the Internet Information Services Log files
The
Internet Information Services provides some various settings designed for the
users to customize their Internet Information Services log files inside the
Internet Information Services manager support. The users could log the files
within the default W3C formation, or else, utilizing the Internet Information
Services, or some other file formats customization. This will enable the users
to specify the rollovers of the log files, and also determining is any new file
is produced hourly, daily, weekly, monthly, etc. In addition to this, the users
also are able to specify the maximum size of the file. Furthermore, the users
also able to customize the fields that are being logged, removing certain
fields that they might not need, selecting from various optional fields, and
the users even able to create their own field as well. To be noted, the custom
fields must be values that are obtainable within the HTTP headers or else from
the server variables.
9.
How to
read the Internet Information Services log files with Microsoft’s Log Parser
Studio
In case if the users desire to open
up the Internet Information Services log files within the log file viewer, then
it is suggested to the users to use any free device such as Log Parser Studio
which established by Microsoft. Here are the steps that the users need to follow,
in order to read the Internet Information Services log files with using the
support of Microsoft’s Log Parser Studio [5]:
·
Firstly, select File > New Query
·
Then select where are the log files
·
Next, set up the type of log in IISW3CLOG
Source:
https://stackify.com/how-to-interpret-iis-logs/
If the users have made it in
specifying the location of a log file along with the type of logs, then the
users could query their Internet Information Services log files. A simple for a
basic query that can be started by the users are such as:
Source:
https://stackify.com/how-to-interpret-iis-logs/
With using the support of this Log
Parser Studio, the users are also able to export the entire data to a type of
CSV file, which able to be used through Excel or some other devices.
Source:
https://stackify.com/how-to-interpret-iis-logs/
10. Analyze and interpret the Internet
Information Services log files with using the log management
Another option for the users who
want to get the best of their Internet Information Services log files is that,
they need to aggregate the entire files inside a log management service. These
devices will able to support the users to view and query them in actual time,
whole across the web servers.
Here
are some benefits provided by aggregating the Internet Information Services log
files with log management [5]:
·
A complete search across the entire
servers
·
Log data archival
·
Monitor any potential issues that might
be appeared at logs
·
Provide easy access to Information
Technology or IT
11. The Benefits of Centralizing the
Internet Information Services Log Files into a Unified view
The
Internet Information Services log files are stored in various and different
locations and directories. In addition to this, Internet Information Services
are stored in different locations based on the varied versions of which type of
Internet Information Services that being used by the users. In reality, it is
not a surprising fact if the business users will have some different versions
of the Internet Information Services inside their organization. In addition to
this, the various cloud has also been offering Internet Information Services to
save its log files in some different locations. This definitely has to add the
complexity of the users in managing these entire files for troubleshooting, as
well as to monitor the web-based applications [6].
In
order to solve this issue, the users could maximize the value of the Internet
Information Services log files by centralizing those files into one unified
dashboard that will be functioned across versions of the Internet Information
Services, and also the settings of hybrid cloud. This method will definitely
deliver some benefits such as mentioned below:
a. Immediate
comparisons of Internet Information Services (IIS)
One
single dashboard designed for viewing the Internet Information Services log
file metrics has the capability to allow for immediate comparisons between the
applications along with their performances. With this, the business users could
measure how the practice of an application will affect the performance of
another application, as well as some other types of networking issues. It will
be more complicated if the users will use the ready metrics of comparison and
then identify the trends that appear in the application usage and also the
performance when the Internet Information Services log data is stored in some
various locations.
b. Real-time
analytics of Internet Information Services (IIS)
A
centralized dashboard designed for searching at the Internet Information
Services log files is considered to be a great method for some of the improved,
real-time analytics that supports in providing the type of data both
immediately and also presented in long-term value. Real-time analytics of the
Internet Information Services log file data also has the potential role in
monitoring any issues related to cybersecurity, which will enable the business
users to reduce the amount of data breaches appearances and also the damage
that they will cause.
c. Alerts
and consistent monitoring of Internet Information Services (IIS)
Assembling
the Internet Information Services log files into an exclusive dashboard is
quite fundamental for consistently monitoring the data, which is specifically
essential with enduring, event-based data normally of a number of website
applications. For this reason, it will be further practical to apply this
consistent monitoring of the Internet Information Services log files if all of
the files are centralized in a single exclusive dashboard instead of the files
that will be scattered around the various different directories and places.
Centralizing
the Internet Information Services log files for consistent monitoring will also
really help in issuing certain alerts, with a purpose to create not just based
on the personal applications and aspects, but also on the entire combinations
of them as well. The action that will be performed and derived from an alert is
considered to be more effective in case if it is based on the consistent
monitoring of the entire Internet Information Services log files.
12. The Modules included in the Internet
Information Services or IIS
The
Internet Information Services contains various modules that present fundamental
functions designed for the application along with the functions of web server.
Every single module that consisted of Internet Information Services has its own
responsibilities. For, example, a responsibility to listen for any type of
request that sent to the server, a responsibility to manage the process, and
also a responsibility to read the configuration files as well. All of these
modules also include the protocol listeners mentioned such as HTTP.sys, in
addition to the services such as the Windows Process Activation Service or WAS
and also the World Wide Web Publishing Service.
13. Security tools of Internet Information Services (IIS):
Microsoft
‘s IIS web server is used as many problem solvers in the network using and it
is being considered as most popular software in today business market. As it is
being considered that the software is used to share on web-content. While using
a network it is necessary to check that the server is covered with strong
security. All the information and data on the IIS web server logs which could
be access by user activity and errors on the security basis. For the security
measures of the IIS logs it should cover with proper system of the network
which could be measures in efficient manner. It could be configured by the
website which could be control by the different security VPN which are used to
troubleshoot the potential website used to resolve the issues of the IIS logs
software. The information related to use the security of the software so that
it could be used to save the information on the IIS software network. There are
many software which could be used to secure the data on the website one of the
best software are used for this purpose (C. Gkantsidis, Karagiannis, & VojnoviC, 2006).
13.1 Webroot of Internet Information
Services (IIS)
Webroot
secures the software as an Antivirus which delivers the data with security and
faster and effective way which protect the files and keep them up to date. It
saves the files from conflict with other security programs and gives a secure
program for the file. It also identifies the protection against the security
threats which are connected with different apps and attack on the files which
are secured in the PC. These are also used to scan the files with maximum speed
and do not create distortion in the networking or performing a specific task.
Webroot is considered as one of the best antivirus software among the others
therefore it is used in IIS logs to protect the data from hacking and stealing (C. P. Jefferies, 2010).
·
Features
of Internet Information Services (IIS)
There
are different features which are used to treat the security of the data on PC
to protect the files and to overcome the deficiency of consistency of the work.
There are some features of webroot which are explained below:
·
It helps to block virsus of different
kinds such as Trojans, spyware, rootkit and many other malware threat in the
application of software.
·
It is lightest and fastest antivirus
software which scans whole PC within just 2 to 3 minutes.
·
It stops the unfamiliar factors which
could be based on the suspicious flow of the software about which there may be
suspicious about the performance of the work.
·
Webroot is most likely to update the
new version automatically and you don’t have to download it by yourself.
·
When it is set once the scan runs
automatically according to the set schedule which increase its efficiency.
·
It fights against spyware, rootkit and
other viruses for the security.
·
Functions
of Internet Information Services (IIS)
There
are also functions which are performed by the webroot antivirus in the security
of the data or information lying in the PC. Functions of webroot includes:
·
It calculates the new agent of files
which needs to calculate in figures or tables
·
It also connects with the bug fixes
which are used to support for edge browsing in the browser.
·
It enhance the efficiency of the work
when it relates to the working with specific applications.
·
It might be reason of image improvement
in the PC which produce high quality images.
·
It’s used to get the backup of data
with the retained setting with the logging with different users.
·
It compares with the compatibility of
other software which are used in the detection of the virus.
13.2 Flowmon of Internet
Information Services (IIS)
Flowmon
is network intelligence interest which integrate the Netops and secOps into one
solution. It has the capability of monitoring the files and automatic function
of monitoring the threat detection. It generates the strong foundation of
information technology which is being processed by the network to overcome the
noise in the apps. It helps to work on PC for professional expertise which are
necessary to done with the different impact and magnitude of the basic cause of
defect. Flowmon is considered as answer of all the questions which are arise in
the monitoring of the information technology. It deals with the performance
issues regarding the unavailability of any data which is used in any
application. It provides a set of operations with deep understandings which are
helpful to understand the issues according to the situation. The functions of
flowmon is totally based on the performance of the as it is widely used by the
large scale companies to secure their data which they use for data security. It
assist the application to eliminate the threat activity which could attack on
the PC through bypass (A. Kamisiński & Fung, 2015).
·
Features
of Internet Information Services (IIS)
The
flowmon is considered as one of the best software which is used by the large
scale business organization to secure their files. It has different features
explained below:
·
Flowmon works with more visibility as
compared to other antivirus networks in the computer networks.
·
It diagnose configuration in operational
activities which is tough task to perform while detecting virus in the files.
·
Flowmon has the quality of quick
troubleshoot the problems detected in the specific task.
·
It works as proactive detection of
threats which are used in the fighting of firewalls against the viruses.
·
It also capable to improve business
performance with the increase of user experience of a specific application.
·
Functions
of Internet Information Services (IIS)
Flowmon
is performing functions in application of computer as antivirus software which
protect the files to being discarded or wasted by the virus. Some of its
functions are discussed here:
·
It is used to save the files lies on
the PC of business and give access to the set schedule.
·
Flowmon is used to increase the
efficiency of the business which related to the increase in the profit
maximization.
·
It enhances the efficiency of the work
when it relates to the working with specific applications.
·
It’s used to get the backup of data
with the retained setting with the logging with different users
The
IIS logs is secured by these software which are used to increase the work
reliability of the organization.
14. Methodology of Internet Information
Services (IIS)
IIS
site for the Microsoft Internet Information Service (IIS) which is used to keep
the files on PC with complete security. It is used to record the different
entries which is used in the daily user activity in different sever usage. IIS
log helps you to control the targeted point which is used to secured, record
and troubleshoot the problems which could be relates to the websites and other
network of data recording using a PC. For instance, you can use the files of
data to make sure that whether it is based on some events. The files in the IIS
log are the easy source to be attacked by the virus but it could be saved by
using security tools for the safety of data. As concerned to security tools of
the IIS log these are discussed above in this report such as webroot and
flowmon. Webroot secures the software as an Antivirus which delivers the data
with security and more fast and effective way which protect the files and keep
them up to date. It saves the files from conflict with other security programs
and gives a secure program for the file as well as Flowmon is network
intelligence interest which integrate the Netops and secOps into one solution.
It has the capability of monitoring the files and automatic function of
monitoring the threat detection. It generates the strong foundation of
information technology which is being processed by the network to overcome the
noise in the apps. Both are used for the security of the data in IIS logs.
IIS
could save the data in lay in different files which are already set in sequence
and scheduled according to the automatic way that it could access the data and
stored in the computer with the help of security tools to save it from viruses.
The files in the IIS logs are formatted in the type which are preferred to
arrange in a system which is confirmed by the useful analysis of the security
measures which are required to perform the security of the files in computer.
User could customize his data in IIS logs which are extended in different
formats according to the properties of the data. In the functions of IIS logs there
is different methods which are used to record the data such as it used IP
address of the data which is running with the proxy web development against the
other threats of the IP address. There may be further feature of user name
which could be only accessed by the server. If there is any attempt by the
unauthorized person there will be proper authentication which will not allow
the person to access the information. The action which is used by the client to
get the post is known as post command. The user could get the HTML and CGI
program which is most commonly used by the computer users (L. Y. Yao & Xiong, 2009). It helps the agent
to access the browser with user name of the user after completing all the
requirements of security measures in the recording of data. While enabling the
IIS logs following method are used:
·
Start the internet information service
on your computer.
·
Enter server name and confirm the
website which must be connected with FTP site which you want to enable in the
properties of the IIS.
·
Click on website to enter FTP site on
the tab of search.
·
Start with the enabling logging in the
box you have given.
·
Use active format or whatever you want
to choose according to the characteristics of data which you want to record.
If you
are using general tab you would run the files with the click of general tab and
create a table to log new files in IIS, but if you are using local website you
have only click on local file naming rollover and enter your data.
15. Conclusion and Recommendations
of Internet Information Services (IIS)
In the
modern days, Microsoft Internet Information Services or IIS servers have turned
out to be one of the essential things to support the businesses in these modern
days.
In
brief, for all of the hard work that the Web server has filled by, along with
the Web site content, the final reckoning is hidden inside the accumulating
files that fill down the number of visitors to a Website. This is where the IIS
Log files contribute its role, in which breaking all of them, with a purpose to
do the analysis will provide valuable information or data.
It is
recommended that companies need to understand properly the definition of
Internet Information Services logs and all the benefits provided by IIS for the
business as well. They should understand
the importance of the Internet Information Services Logs for the business or
Web servers. The businesses should have the ability to identify some issues
related to the Internet Information Services Log files along with recognizing
the options of security tools related to the Internet Information Services. It
will better help the firms to generate huge profits as well as the current
research will provide proper guidance for future research related to the
Internet Information Services.
References of Internet Information Services (IIS)
[1]
|
A. Zambelli,
"IIS smooth streaming technical overview," Microsoft Corporation,
p. 40, 2009.
|
[2]
|
T. Titus,
"Getting Started with the IIS Manager in IIS," 16 November 2007.
[Online]. Available:
https://docs.microsoft.com/en-us/iis/get-started/getting-started-with-iis/getting-started-with-the-iis-manager-in-iis-7-and-iis-8.
[Accessed
November 2019].
|
[3]
|
J. v. d.
Erve, "Managing IIS Log File Storage," 30 May 2014. [Online].
Available:
https://docs.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/managing-iis-log-file-storage.
[Accessed
November 2019].
|
[4]
|
M. Burnett,
"Maintaining Credible IIS Log Files," 12 November 2002. [Online].
Available:
https://www.symantec.com/connect/articles/maintaining-credible-iis-log-files.
[Accessed
November 2019].
|
[5]
|
M. WATSON,
"How to Read & Customize IIS Log Files," 14 May 2017. [Online].
Available: https://stackify.com/how-to-interpret-iis-logs/.
[Accessed
November 2019].
|
[6]
|
Sumologic.com,
"Where are IIS Log Files?," 10 May 2019 . [Online]. Available:
https://www.sumologic.com/blog/iis-log-files-location/.
[Accessed
November 2019].
|