IT tutorials
 
Windows
 

Windows Server 2012 : Securing IIS 8 (part 4) - Configuring Feature Delegation, Using IIS Logging

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/18/2013 1:54:31 AM

8. Configuring Feature Delegation

To allow users who have been granted permission to a site, application, directory, or page to make changes to configurations, feature delegation must be used to unlock the relevant portion of the configuration file for the element. Follow these steps to configure feature delegation for a newly created website:

1. In IIS Manager, navigate to the Connections pane and select the IIS server.

2. Select the Feature Delegation feature icon, which is located in the Central Details pane.

3. On the Features Delegation page, select the Custom Site Delegation task from the Actions pane.

4. Select the site to be delegated from the Sites drop-down menu on the Custom Website page.

5. Select the appropriate feature in the list and then set the desired feature delegation from the Actions pane. The delegations include: Read/Write, Read Only, Not Delegated, and Reset to Inherited.


Note

In some circumstances, you might need to reset delegation or restore the defaults. When you find this necessary, click the Reset All Delegation or Default Delegation in the Actions pane.


9. Using IIS Logging

IIS logging should be viewed as a necessity rather than an optional feature of IIS because it helps to ensure IIS security and is also extremely useful for maintenance and troubleshooting. For example, in the event of a system compromise, logs can be used and a forensic review performed on the extensive details contained in them. This information can then be used to review maintenance procedures and identify problems in the system. Equally important, many organizations now require logging because of regulatory compliance or other business policies.

IIS text-based logging, using formats such as the W3C Extended Log File Format, Microsoft IIS Log File Format, and NCSA Common Log File Format, is controlled by Http.sys, which is a kernel-mode process. This is a significant change from legacy versions where logging was a user-mode process. The only other log file format that comes close to legacy versions is Open Database Connectivity (ODBC) logging, because it is implemented using a user mode worker process.

Another bonus about logging is its ability to be implemented at the server, site, web application, file, and directory level. Specific scoping helps minimize the number of logs collected and simplifies log analysis. For organizations that want to configure IIS logging for a specific website, follow these steps:

1. Launch IIS Manager.

2. In the Connections pane, select the desired website for which you want to configure logging.

3. Double-click the Logging feature in the Actions pane.

4. On the Logging page, select the desired logging format to be used.

5. Specify the location of the log file by typing a log path into the Directory text box. Alternatively, click the Browse button and select a directory to store the files.

In the Log File Rollover section, select the method to create the new log file. The options include specifying an hourly, daily, weekly, or monthly schedule; entering a maximum file size (in bytes); or selecting the option that puts a stop to the creation of new log files.

The final option requires you to determine whether to use local time for file naming and rollover.

6. After all the log file settings have been entered, select Apply in the Actions pane to commit the changes.


Note

It is possible to either enable or disable a log file for a specific site by selecting Enable or Disable in the Actions pane of the Logging feature page. To enable logging for IIS 8, the HTTP Logging Module must be installed.

 
Others
 
- Windows Server 2012 : Securing IIS 8 (part 3) - Creating an IIS 8 User Account, Assigning Permissions to an IIS 8 User Account
- Windows Server 2012 : Securing IIS 8 (part 2) - Auditing Web Services , Using SSL Certificates
- Windows Server 2012 : Securing IIS 8 (part 1) - Windows Server 2012 Security, IIS Authentication
- Windows Small Business Server 2011 : Using Group Policy Results
- Windows Small Business Server 2011 : Group Policy Preferences (part 3) - Using Group Policy Preferences for Windows - Files
- Windows Small Business Server 2011 : Group Policy Preferences (part 2) - Using Group Policy Preferences for Windows - Drive Maps
- Windows Small Business Server 2011 : Group Policy Preferences (part 1)
- Windows Small Business Server 2011 : Deploying Applications with Group Policy (part 4) - Configuring the Group Policy Software Installation Extension - Adding a Software Package to a Group Policy
- Windows Small Business Server 2011 : Deploying Applications with Group Policy (part 3) - Configuring the Group Policy Software Installation Extension - Setting Software Installation Options
- Windows Small Business Server 2011 : Deploying Applications with Group Policy (part 2) - Creating a GPO for Software Deployment
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us