Chapter 4. IIS Security

As an application, internet information services provides its own security methods. And because these security features work together with those provided in the base operating system, a good understanding of Windows 2000 security is necessary before you can configure Internet Information Services security. If you skipped over the last chapter and don't have a strong understanding of Windows 2000 security, go back and review it before proceeding.

This chapter covers the following topics:

  • How Internet Information Services security functions, and how it relates to Windows 2000 security

  • The role of IP address and domain name restrictions

  • Internet Information Services access permissions and their relationship to NTFS permissions ...

Get Internet Information Services Administration now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.