Må vi gemme en cookie?

Vi bruger cookies for at forbedre din oplevelse af vores hjemmeside, målrette indhold samt statistik. Læs mere om cookies



Brug for hjælp?

  • Gregersensvej 8
  • 2630 Taastrup
Google MapsApple MapsRejseplanen
  • Forskerparken Fyn, Forskerparken 10F
  • 5230 Odense M
Google MapsApple MapsRejseplanen
  • Teknologiparken Kongsvang Allé 29
  • 8000 Aarhus C
Google MapsApple MapsRejseplanen
  • NordsøcentretPostboks 104
  • 9850Hirtshals
Google MapsApple MapsRejseplanen
  • Gammel Ålbovej 1
  • 6092Sønder Stenderup
Google MapsApple MapsRejseplanen

Masterclass: Internet Information Services 10 Management

Lær, hvordan du konfigurerer advancerede IIS features, sikkerhedsindstillinger, hvordan du udfører avanceret troubleshooting og monitorering. Lær alt du behøver for at vedligeholde og sikre adgang til virksomhedens Web Application platform. Undervisningen foregår på engelsk.

Internet Information Services is a solution that can be delivered in a couple of hours as well as in 3 weeks – we practiced both options! IIS is a never-ending subject that requires a deep-dive if you consider using it for web farm administration or if you want to become familiar with IIS behavior in particular situations. During this intensive 4 days training students will be introduced to the process of configuring advanced IIS features, configuring security settings, performing advanced troubleshooting and monitoring. You will learn everything you need to maintain and provide availability to business Web Application platform.


Enterprise administrators, web administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.

To attend this training you should have attended MS 6427A course Configuring and Troubleshooting Internet Information Services in Windows Server 2008 or have equivalent knowledge from real-world experience.


Module 1: Introducing, installing and configuring IIS 8.5 on Windows Server 2012 R2
  • Introducing Internet Information Services 8.5: Administration tools, Architecture overview, Configuration System overview
  • Comparing IIS 7.5 to IIS 8.0/8.5:
  • Installing the Web Server (IIS) role in Windows Server 2012 R2: Discussing the deployment scenarios, Using Server Manager, Using Unattended Setup, Using Command Line, Troubleshooting installation.
  • Post-installation administration tasks: HTTP Features, Security Settings, Logging
Module 2: Administering Web Sites
  • Creating a Web Site, Application, Virtual Directory
  • Managing Security settings for Web Sites
  • Administering Web Site logging
  • Configuring Failed Request Tracing
  • Managing Virtual Directories and remote content
  • Configuring Authentication Types
  • Configuring Bindings
Module 3: Administering Applications and Application Pools
  • Managing Application Pools and Applications
  • Global Application Initializations
  • Managing Application Pool Identity
  • Managing Worker Processes and requests
  • CPU Throttling: Sand-boxing Sites and Applications
  • Idle Worker Process Page-Out
Module 4: Configuring Application Development Settings
  • ASP.NET Security Settings
  • ASP.NET Application Development Settings
  • Configuring ASP.NET
Module 5: IIS 8.5 functionality extensions
  • Architecture Extensions: CGI, FastCGI, ISAPI, ASP
  • Managing Extensions: Security, Delegation
  • Functionality Extensions: PHP, WebDAV, Media Services, URL Rewrite.
  • Performance Extensions: Application WarmUp
  • Security Extensions: URLScan / URLRewrite, Dynamic IP Restrictions
  • Administrative extensions
Module 6: Managing IIS 8.5 Modules
  • Adding IIS 8.5 Modules
  • Administering IIS 8.5 Modules
Module 7: Securing the IIS 8.5 platform and web environment
  • Configuring security settings on Windows Server 2012
  • Centralized SSL Certificate Support
  • Secure Web Site settings
  • Configuring authentication and authorization
  • Restricting Web Site access
  • Secure Web Server implementation scenario
Module 8: IIS 8.5 Remote Management
  • Enabling and configuring remote administration
  • Enabling and configuring delegated administration
  • Enabling and configuring feature delegation
  • Managing application Host.config and Web.config access levels
  • Security considerations for remote management
Module 9: Configuring FTP Server on IIS 8.5
  • Managing FTP Authentication
  • Managing FTP Authorization
  • Configuring FTP Logging
  • Configuring FTP Logon Attempt Restrictions
  • Administering FTP Request Filtering
  • Configuring FTP User Isolation
Module 10: Managing IIS 8.5 from the command line
  • Tools overview
  • Advanced management with PowerShell
  • Tools for Running Administrative Tasks in IIS
  • Automating management with Appcmd
  • IIS 8.5 and scripting
  • 3rd party management tools
Module 11: Tuning IIS 8.5 health and performance
  • Performance monitoring techniques
  • Monitoring IIS 8.5 under attack
  • Optimizing IIS 8.5 settings for better performance
  • Implementation scenarios analysis
  • Dynamic site activation
  • Idle Worker Process Page-out
  • Using 3rd party tools for performance monitoring
Module 12: Administering Web Server Availability with Web Farms
  • Shared Configuration
  • Advanced Network Load Balancing settings and configuration
  • Building the Web Farm
  • Managing the Web Farm
  • Automating tasks in multiple server IIS 8.5 environment
  • Policy based management
  • Server Name Indication (SNI) – SSL Scalability
  • Backing Up an IIS Web Site
  • Restoring an IIS Web site
  • Multicore Scaling on NUMA hardware overview
  • Application Request routing
Module 13: IIS 8.5 Diagnostics
  • Auditing IIS 8.5 logs
  • Enhanced Logging
  • Logging to Event Tracing for Windows
  • Common error messages and examples
  • Auditing communication problems and examples
  • Troubleshooting authentication problems
  • Troubleshooting authorization problems
  • Managing and understanding problems with configuration


Greg Tworek is system engineer, computer-man in second generation. For dozen of years he is actively promoting the idea of information technology security, especially in conjunction with Microsoft. Author of many articles and books about security, speaker in various conferences. As one of the four people in the world he holds the title of MVP in Enterprise Security category with specialization in Training. He has access to a source code of Windows.


Paula Januszkiewicz is a word-renowned Security Expert. Paula loves to perform Penetration Tests, IT Security Audits, and after all she says: ‘harden’em all’! Enterprise Security MVP and trainer (MCT) and Microsoft Security Trusted Advisor.

Har du faglige spørgsmål så kontakt
Andre kigger også på