Windows IIS 6.0 Complete Guide| IIS 6.0 Tutorial

Windows IIS 6.0 Complete Guide| IIS 6.0 Tutorial

Internet Information Services:


Internet Information Services (IIS) 6.0 is a powerful Web server that provides a highly reliable, manageable, and scalable Web application infrastructure for all versions of Windows Server 2003. IIS helps organizations increase Web site and application availability while lowering system administration costs. IIS 6.0 supports the Microsoft Dynamic Systems Initiative (DSI) with automated health monitoring, process isolation, and improved management capabilities.

Starting the IIS:

You can use Run as through the user interface (UI) or as a command-line tool. The Run as feature that is built into the UI is a shortcut that you access by right-clicking some programs (files with the .exe file name extension), some Control Panel items (files with the .cpl file name extension), and Microsoft Management Console (MMC) (files with the .msc file name extension) snap-ins.


To use the Run as feature to run IIS Manager as an administrator


From the Start menu, point to Administrative Tools, right-click Internet Information Services (IIS) Manager, and then click Run as.

The runas command provides the same capabilities as the built-in Run as feature.


To use the runas command to run IIS Manager as an administrator

1.
From the Start menu, click Run.

2.
In the Open box, type cmd, and then click OK.

3.
At the command prompt, type the following:

runas /User:Administrative_AccountName “mmc %systemroot%system32inetsrviis.msc”


To use the runas command to run a command-line script as an administrator

1.
From the Start menu, click Run.

2.
In the Open box, type cmd, and then click OK.

3.
At the command prompt, type the following:

runas /profile /User:MyMachineAdministrator cmd

A new command window, which has administrative rights, opens.

4.
In the new command window, type the following at the command prompt:

cscript.exe ScriptName (include the script’s full path and any parameters)

Starting and Stopping Services and Sites

Infrequently, you might make configuration changes in IIS 6.0 that require you to restart IIS before the changes can take effect. For example, if you change the application isolation mode in which your server is running, such as when you change from worker process isolation mode to IIS 5.0 isolation mode or vice versa, you need to restart IIS. If you make this configuration change by using IIS Manager, you are prompted to restart IIS after you click OK to confirm the change. If you make this configuration change by using a command-line utility, such as Adsutil.vbs, you can use the IISReset command-line utility to complete the change. Both methods — using the Restart IIS command in IIS Manager or using a command-line utility — allow you to stop, start, and restart IIS Internet services, as well as restart your computer.

When you restart the Internet service, all sessions connected to your Web server (including Internet, FTP, SMTP, and NNTP) are dropped. Any data held in Web applications is lost. All Internet sites are unavailable until Internet services are restarted. For this reason, avoid restarting, stopping, or rebooting your server.

For a list of features designed to improve IIS reliability and remedy the need to restart IIS, see the Alternatives to Restarting IIS section in the Restarting IIS topic in the IIS 6.0 Operations Guide, which is accessible from IIS Manager.

Saving Your Configuration to Disk

As a safeguard, if you must stop or restart IIS, save your configuration to disk before you perform the restart. Your configuration is automatically saved if you enable the edit-while-running feature (this feature is not enabled by default). Alternatively, you can manually save your configuration to disk.

If You Receive an Error Stating That IISReset Is Disabled

If the IISReset command-line utility is disabled, then the command-line or IIS Manager calls that require IISReset.exe fail and return an error stating that IISReset is disabled. Actions that fail include the Restart IIS command in IIS Manager and Service Control Manager (SCM) recovery configuration actions that use the IISReset command-line utility (for example, the default IIS Admin SCM recovery path). However, SCM recovery actions that do not use the IISResetcommand-line utility continue to function (for example, the default World Wide Web Publishing Service [WWW service] SCM recovery path that restarts the WWW service).

Creating a Website and FTP site

IIS creates a default Web site on your computer during installation. You can use the LocalDrive:InetpubWwwroot directory to publish your Web content, or you can create any directory or virtual directory you choose. Because the FTP service is not installed by default, you must first install and start the File Transfer Protocol (FTP) service to create an FTP site.

Creating a Web or FTP site by using IIS Manager does not create content but merely creates a directory structure and configuration files from which to publish the content. .

Log Files

Logging in IIS 6.0 differs from logging in previous versions of IIS in several ways. The redesigned IIS architecture, which allows for multiple worker processes, affects how the IIS core components handle logging. In addition, IIS 6.0 provides new logging features and log file formats.

Events Are Logged by HTTP.sys

In IIS 5.0, all logging is done by the Inetinfo.exe component and is accomplished using Component Object Model (COM) modules that are written for logging. This system is effective in IIS 5.0 because there is only one server process model, Inetinfo.exe. However, in IIS 6.0, logging is done by the HTTP protocol stack (HTTP.sys). IIS 6.0 passes user-mode events to HTTP.sys through application programming interfaces (APIs), and then the user-mode events are logged by HTTP.sys.

HTTP.sys handles logging for two main reasons. When IIS 6.0 is running in worker process isolation mode, each worker process can perform its own logging and a site applications can spread across multiple application pools. If Inetinfo.exe performed logging in this environment, multi-instance or synchronization problems could occur. Such problems can be avoided because HTTP.sys performs logging. In addition, in IIS 6.0, requests can be served completely from the HTTP.sys kernel-mode cache without ever passing through Inetinfo.exe, so logging from HTTP.sys ensures that cached responses are recorded.

The log file format for which HTTP.sys does not perform logging is only Open Database Connectivity (ODBC) logging

W3C Centralized Logging

W3C centralized logging is a global configuration on the server where all Web sites write data to a single log file. This single log file uses the W3C Extended log file format and can be viewed in a text editor, unlike centralized binary logging, which writes data in a binary format and requires a parsing tool to view the data. W3C centralized logging is available in Windows Server 2003 Service Pack 1 or later

Substatus Error Code Logging

To reduce the possibility that a malicious user might use the information provided by substatus error codes to attack the Web server, substatus error codes are not returned to the client in IIS 6.0. Instead, administrators using the World Wide Web Consortium (W3C) Extended log file format can record substatus error codes when requests fail. Substatus error code logging is turned on by default for the W3C Extended log file format.

IIS Centralized Binary Logging

Centralized binary logging is a process in which IIS creates a single log file that contains binary, unformatted log data for all of the Web sites hosted on a server. In contrast, the other available IIS logging methods create one formatted, human-readable log file per Web site. Centralized binary logging provides organizations with a way to record detailed information about all of their Web sites, using a minimum of system resources.

HTTP.sys Error Logging

HTTP.sys sometimes generates its own errors that, because of the IIS 6.0 architecture, are not recorded with the worker-process-driven events. To account for these errors, IIS 6.0 supports HTTP.sys error log files. One example of an event that would trigger a log file entry in the HTTP.sys error log file is a connection time-out.

Remote Logging

You can write log data to a remote share over a network using a full, Universal Naming Convention (UNC) path. For example, you can specify \ServernameLogFiles as the storage directory for your log files, where Servernamerepresents the name of the remote server, andLogFiles represents the name of the directory where the log files are stored.

Tools for troubleshooting IIS

The following tools are useful for troubleshooting problems that occur with IIS 6.0:


WFetch (WFetch.exe). This tool allows you to generate customized HTTP requests and view request and response data.


File Monitor (FileMon.exe). This tool allows you to view and capture real-time file system activity.


Registry Monitor (RegMon.exe). This tool allows you to view and capture real-time system registry activity.


IIS Request Monitor. This tool captures information about HTTP requests in IIS worker processes, which can help you isolate and understand problems when worker processes become slow or unresponsive.


Secure Socket Layer (SSL) Diagnostic Tool (SSLDiag). This tool helps you identify configuration problems in the IIS metabase, certificates, or certificate stores when running Web sites that use SSL.


Authentication and Access Control Diagnostics (authdiag.exe). This tool allows you to review, test, and correct problems with authentication and authorization.


IIS 6.0 Enterprise Tracing for Windows. This tool allows you to trace HTTP requests as they move through various components in your server architecture. IIS components provide informational events and error events (if applicable) to the ETW architecture as requests enter and exit each component. You can view the event data to see exactly where in the IIS architecture a request failed or became unresponsive.


Network Monitor. This network tracing utility allows you to view activity in the network stack. Network Monitor is included with Windows Server 2003.


System Monitor. This tool allows you to view and collect system performance data. System Monitor is included with Windows Server 2003.


HRPlus. This tool provides error lookup functionality.


Microsoft Debugging Tools for Windows. This tool allows you to debug and diagnose application problems.

Creating New Web Sites:

A single web server can host multiple web sites. Before multiple sites can be hosted, however, one of three methods has to be implemented. (See the following section entitled “Hosting Multiple Web Sites on a Single Web Server.”) By default, any new web site created will be stopped and won’t be able to respond to requests for pages.

Exercise : Creating a New Web Site

In this exercise, you will create a new web site, provide content, and test the server to verify that content is viewable.

1. Click Start | All Programs | Administrative Tools | Internet Information Services Manager to open the IIS Manager MMC.

2. Right-click the Web Sites node and select New | Web Site.

3. Click Next to begin the Web Site Creation Wizard.

4. In the Description field, type  WebsiteName.com and click Next.

5. Accept the default of All Unassigned for the IP address and Port 80 for the port.Do not enter a host header.

Click Next.

6. For the Web Site Directory, navigate to the Web folder which contains web site to be displayed.

Click Next.

7. Uncheck the permission to run scripts and verify that Read is the only permission present. Click Next.

8. Click Finish to complete the operation.

9. Right-click the Default Web Site and select Stop.

10. Right-click the WebsiteName.com web site and select Start.

11. Open Internet Explorer and type http://yourserver into the navigation bar to

view the web site.

Hosting Multiple Web Sites on a Single Web Server

There are three methods to hosting multiple web sites on a single web server:

• Assign a unique IP address to each site

• Assign a unique port number to each site

• Assign host headers to each site

Each of these methods has some sort of drawback, so it is important that you evaluate what is most important before selecting a method. The settings are on the Web Site tab of the properties page. Assigning a unique IP address to each site is the easiest of the three methods. However, you need to either configure a single network card with multiple IP addresses or install a new network card for each web site. An IP address has to be specified when a new web site is created, but All Unassigned is the default option. All Unassigned then assigns all IP addresses associated with the server to the web site. If an IP is selected that is in use by another site on the same server, the web site will be created in a stopped state. To start the site, either the other site has to be stopped or a unique IP has to be assigned. Assigning a unique port number to a site is more a security procedure than a method

of supporting multiple sites on a single server. By default, all web sites use port 80. Any traffic coming into the server on port 80 is automatically directed to the web site. If a unique port number is used for a site, only traffic coming into the server on that port number will be directed to the site. The problem with this is that Internet Explorer and other browsers automatically request pages on port 80, and any other port has to be specified in the address bar of the browser by the user. If a second web site was configured to use port 6767, for example, users would need to type www.WebsiteName.com:6767 to access the site. If you want your users to check e-mail on a publicly accessible web site, but you want the site to remain hidden from the public, you could create the web site on a different port number than 80 and then require your users to enter the port number in the address field to access the site. Excellent for keeping a particular site hidden, not so excellent as a method of hosting two sites on the same server. Host headers require a bit more administration to use, and are not as popular a method because they don’t support SSL encryption and are unable to be used by earlier versions of browsers that don’t support HTTP 1.1. To use host headers, you must configure DNS and IIS.

To configure host headers:

Part 1 – Configure IIS

1. Click Start | All Programs | Administrative Tools | Internet Information Services.

2. Expand the Web Sites node and select the Default Web Site. Right-click the

Default Web Site and select Properties.

3. On the General tab, select the IP address from the drop-down list. Click Advanced.

4. In the Advanced Web Site Configuration Properties page, select the Default IP

address and click Edit.

5. Enter a value for the Host Header. Click OK and close the Web Site Properties.

Part 2 – Configure DNS

1. Click Start | All Programs | Administrative Tools | DNS.

2. Navigate to the appropriate zone.

3. Add a CNAME record in the zone. For the Alias name, enter the Host Header

value. For the Fully Qualified Name of the target host, enter the FQDN of the

web server.

Monitoring Web Sites & It’s Log

The IIS Manager includes logging and monitoring options. To configure monitoring, open the web site properties and click the Web Site tab. The Enable Logging check box is selected by default, which automatically turns logging on. The default format for logging is W3C Extended Log File Format, but additional formats can also be used, such as Microsoft IIS Log File Format, NCSA Common Log File Format, or ODBC Logging. When logging is enabled, events are written to the application log in Event Viewer. To view additional logging options for the W3C Extended Log File Format, as shown in Figure , click the Properties button. Notice that logging can be scheduled or based upon a preset file size. Also, there is an option to use local time for all logging. When users

request pages from the web site, they transmit their own system time to the web site. If local time is not used, it is possible for events that occur very late in the day would be logged in the following day’s log file, based on the time of the remote system. Also, when IIS is installed, additional counters are automatically added to System

Monitor. These counters are used in the same way that other counters are used, and they can either be monitored in real time or stored as a log file.

Figure Logging Properties of the W3C Extended Log File Format

Configure Authentication and Restrictions:

All users of a web site actually have to authenticate to the domain before being able to access information, even anonymous users. By default, browsers attempt to access resources anonymously. If anonymous users are allowed access to the web site, they are authenticated to the IUSR account. (Go ahead, check your AD Users and Computers, it’s there!) The IUSR account is an Internet user account created just for the purpose of allowing

anonymous access and has very limited permissions granted. Anonymous users can be prevented from accessing your entire site or only specific directories. For example, you might run a personal web page where you post a letter to your family with recent pictures and so on. But you might also have a link on your personal web page to Outlook Web Access, which you use when you’re on the road. Anyone with nothing better to do can access your personal web page, but they must have a valid user account in your Active Directory to log on to your Outlook Web Access directory. In this case, the anonymous user has been removed from the proper directory, and users must be a member of the appropriate group before they can log on and check e-mail. If you wanted to go one step further, you could remove the anonymous user from your entire site, and users would have to be authenticated to your Active Directory to even view the letter and pictures. To restrict a site, right-click the web site and select Properties, then click the Directory Security tab. Click Edit in the Authentication section to display the authentication options, as shown in below Figure 1. Notice that anonymous access is allowed by default, and all requests will be authenticated to the IUSR account. The following authentication methods can also be used:

• Integrated Windows authentication

• Digest authentication for Windows domain servers

• Basic authentication

• .NET Passport authentication

Integrated Windows Authentication When this type of authentication is selected, a domain user account must be present for the user attempting to access the web site. The user is authenticated against the Active Directory in which the IIS server is a member. The user also must be a member of the appropriate groups to have access to the

content and directories located on the web server. When a user attempts to access a web site, they are prompted for their user name and password, as shown in below Figure 2. If the user is already logged onto the domain in which the web server is located, they are not prompted for a user name and password as their current domain account is used automatically. Integrated Windows authentication uses either Kerberos or NTLM as the

Figure 1 The Authentication Methods properties page

authentication protocol, depending on the capabilities of the client, ensuring that passwords are not passed over the Internet in clear text. Integrated Windows authentication is most commonly used in intranets.

Figure 2 User name and password prompt when attempting to access a secured site

Digest Authentication Digest authentication is used when Integrated Windows authentication is not supported, and is most commonly used over the Internet. An MD5 algorithm is transmitted instead of the actual password, and the values are compared against the password in Active Directory. Users must still have a valid user account in Active Directory to be authenticated using this method.

Basic Authentication Basic authentication is the most widely supported and the most commonly used form of web authentication. Passwords are sent in clear text across the Internet and verified against the domain in which the IIS server is a member. Accounts on a different domain can also be used by entering a domain in the appropriate field or by clicking Browse and selecting the desired domain. Basic authentication is supported by nearly all browsers and all operating systems, which is why it is so commonly used. Using basic authentication ensures that nearly everyone visiting the site will be able to log on and authenticate in order to use web resources.

.NET Passport Authentication .NET Passport is Microsoft’s baby and the method they have come up with to authenticate users to multiple web sites by using a single e-mail account. .NET is natively supported in Windows XP and Windows Server 2003, and you’ve most likely seen the pop-ups to register a .NET Passport with your user

account. Microsoft has switched all of their secure directories and sections on their web site to .NET Passport, and so you have probably been forced already to establish a .NET Passport account. On the up side, using .NET Passport really does mean that a single e-mail address will work for multiple sites. .NET Passport was created with e-commerce in mind to make signing on and shopping easier and faster. .NET Passport supports all the good web stuff as well, such as SSL, cookies, and JavaScript, and is compatible with IE 4 and higher, Netscape 4 and higher, and Opera 7.11 and higher.

Configuring IP and Domain Restrictions

In addition to requiring users to authenticate to the site, certain users can be blocked from accessing the web site by their IP address or their domain name. This technique is especially useful to prevent hackers from gaining access to the web server. Access can be either blocked or allowed based on a source IP or domain name, as shown in below

Figure 3. Let’s say you are configuring a secure site that only your own network and one of your clients is going to be authorized to use. You will first enable Integrated Windows authentication and make sure that each user has a valid user account in your Active Directory. But you can go one step further. You can enter the network ID of the client and the network ID of your own internal network, and allow access to only those specific blocks

Figure 3 Allowing access to a specific IP address

of IP addresses. Using this in conjunction with user names and passwords makes a very secure web site indeed.

To enter a specific IP address or a network ID, click Edit to bring up the IP Address and Domain Name Restrictions page. Then click Add and enter a single IP or network ID or domain name, as shown in Figure 3. Be aware that if a domain name is entered, a reverse DNS lookup will be required for every user attempting to access the site, which can significantly slow performance. (You are even warned about this behavior when

you click the option.)

Use Secure Sockets Layer (SSL) and Certificates

If Secure Sockets Layer (SSL) is configured to be required for a particular site or directory, all users attempting to access the site or directory are required to use HTTPS, and all information transferred between the client and the web server is encrypted. E-commerce sites should use SSL at a bare minimum to protect credit card transactions, viewing of account data, user logons, and other personal services. To enable SSL, click Edit under Secure

Communications and select Require Secure Channel (SSL). Windows Server 2003 servers built and used only in the United States also have the option to require 128-bit encryption, also known as strong encryption, rather than the standard 40-bit encryption. It is illegal to export 128-bit encryption outside of the United States. Certificates can also be used as a method to protect the web site and to authenticate users and allow access. Before certificates can be used, a certificate authority must be installed and configured. See Chapter 17 for more information on certificate authorities. By configuring the appropriate certificate settings in the Directory Security properties

page, and by installing and issuing certificates, an extremely secure web site can be built.

IIS Web server Tuning best practices

IIS Web server Tuning best practices

Following are the methods used for tuning IIS Webserver:

  • Enabling HTTP Keep-Alives
  • Adjusting Connection Timeouts
  • Enabling HTTP Compression
  • Growing a Web Garden
  • Adjusting the IIS Object Cache Time To Live
  • Limiting Queue Length
  • Adding Memory
  • Use of Disk Striping

1). Enabling HTTP Keep-Alives

  • Making sure that HTTP Keep-Alives is enabled is one of the several ways to help your IIS server perform optimally.
  • If Keep-Alives is enabled, the Web browser can download multiple files without opening and closing the connection every time, as the IIS holds the connection open.
  • You can enable HTTP Keep Alives by going to the Internet Information Services, select your server, and right click on the website for which you want the changes to be affected, click on Properties. The radio button which says “Enable HTTP Keep-Alives” must be clicked.

2). Adjusting Connection Timeouts

  • The developer would not want to keep the connection open for an indefinite period of time.
  • The connection timeout is set to 120 seconds by default in the IIS 6.0. That means a connection would be closed if there is inactivity for 120 seconds of time.
  • The server performance is usually increased with shorter timeout periods, but you need to take care if the client’s connection terminates prematurely or not, otherwise there would be a performance degrades seen.
  • You can adjust the Connection timeout by going to the Internet Information Services, select your server, and right click on the website for which you want the changes to be affected, click on Properties. In the Connection timeout field, enter the number of seconds.

You can monitor the connection timeout by enabling logs in the web server and selecting counters like MemoryPages/sec, % Processor time, Current Connections, Total Connection attempts. The current connections must reduce without any drastic increase in the Total Connection attempts. This has to be monitored for some days along with application testing to conclude if we are doing it right.

3). Enabling HTTP Compression

  • There are 2 types of compression

Compression of static pages

Compression of dynamic pages

  • Compression can be enabled by right-clicking on the IIS’s Web Sites container, select Properties. Select the Service tab in the resulting window. There are 2 check boxes – One to compress static files, another to compress dynamic files.

  • Static compression takes care of these extensions by default – html, htm,txt
  • Dynamic compression takes care of these extensions by default – .dll, .exe, .asp

  • There is an option where you can specify the location where the temporary compressed files are stored and also its size.

Advantages and disadvantages of compression

Although compression conserves bandwidth, it can still be at a disadvantage at times as it takes lot of disk space and CPU time

Enabling static compression is a good idea when your website contains mostly static files as these can be compressed and cached easily. The files would be re-compressed only when the original file changes, not otherwise.

It is also beneficial when you have a lot of disk space to spare.

Enabling dynamic compression would not be that great if there is a lot of dynamic content in your application. This is because dynamic content would not be cached and it will need higher processor usage to re-compress every time a client passes a request.

HTTP Compression is not ideal when your % Processor Time counter is above 80%, also when you have inadequate disk space.

You can monitor the HTTP Compression by enabling logs in the web server and selecting counters like MemoryPages/sec, % Processor time, Current Connections, Total Connection attempts. The Pages/sec loaded must increase without any drastic change in the other parameters. This has to be monitored for some days along with application testing to conclude if we are doing it right.

4). Growing a Web Garden

  • Web garden is a way of assigning multiple worker processes.
  • The benefits of several worker processes are many. When an application causes a worker process to hang, like for example Infinite loops, then the other worker processes can come into play and keep servicing requests.
  • You can achieve this by right clicking on the application pool, selecting Properties and assigning the number of worker processes.

5). Adjusting the IIS Object Cache Time to Live

  • Any object that is requested by the client would be cached by IIS.
  • The Time To Live value is set to 30 seconds by default.
  • Reducing the TTL is a nice way to gain some memory back for other functionalities if the server is a little short on memory.
  • If the server has a lot of free memory and mainly static pages, then it’s a good idea to improve performance by increasing the Time To Live or TTL.
  • The TTL can be set from the Registry editor from 0 (caching not present) to 4,294,967,295 i.e. the max time limit that says unlimited caching.

6). Limiting Queue Length

When there is heavy traffic in the site, it would sometimes be better that you indicate some visitors to exit from the site than wait endlessly.

  • Limiting the queue length also takes care that any person, whose request is being queued, would definitely be served within a good amount of time.
  • All the other people would receive a notice saying that the server is busy and they can leave the site.

7). Adding Memory

It is good to add more RAM to your machine. If the RAM is more in your machine, less paging occurs which is a good thing as paging  results in the machine running much slower and is extremely inefficient at times.

8). Use of Disk Striping

Disk striping is quite effective. This spans files across multiple/several hard drives so that we can achieve the benefits of combined performances of multiple/several drives.

How to configure ODBC logging in IIS

How to configure ODBC logging in IIS

Following are the steps used for configuring ODBC logging in IIS

Create a Table

  • Create a table in the Microsoft Access or SQL Server database. To do this, either follow the steps in the Run a SQL Script to Automate Creating the Table section, or create a table manually by using the fields in the Table – Field Format section. The default table name is InternetLog on the ODBC Logging Properties page in the Internet Services Manager (ISM) Microsoft Management Console (MMC).

NOTE: These steps work for World Wide Web (WWW) or File Transfer Protocol (FTP) logging on the Web server.

Run a SQL Script to Automate Creating the Table

If you are using a computer that is running SQL Server, you can create the IIS ODBC logging table with a Transact-SQL script named Logtemp.sql that is included with IIS. To do this, follow these steps:

1. Log on to the server with a user account that has administrative access on the computer that is running SQL Server.

2. Open SQL Server Query Analyzer.

3. On the File menu, click Open.

4. Locate the %Windir%System32Inetsrv folder.

5. Click Logtemp.sql, and then click Open.

6. In the first line of the Logtemp.sql script, replace inetlog with InternetLog.

7. Select the database to create the InternetLog table. By default, the database is Master, but the company does not recommend that you use this database.

8. Click Query, and then click Execute.

Table – Field Format

FieldName: ClientHost

Data Source/Type: Varchar(255)

Explanations: Client IP address.

FieldName: Username

Data Source/Type: Varchar(255)

Explanations: User name for the client. If the page is not password-protected, this is always the anonymous user name.

FieldName: LogTime

Data Source/Type: Datetime

Explanations: Date and time that the log entry was created.

FieldName: Service

Data Source/Type: Varchar(255)

Explanations: Name of the service. This can be WWW, FTP, or some other name.

FieldName: Machine

Data Source/Type: Varchar(255)

Explanations: Server name.

FieldName: ServerIP

Data Source/Type: Varchar(255)

Explanations: Server IP address.

FieldName: ProcessingTime

Data Source/Type: Int

Explanations: Time spent on request processing (in milliseconds).

FieldName: BytesRecvd

Data Source/Type: Int

Explanations: Number of bytes received.

FieldName: BytesSent

Data Source/Type: Int

Explanations: Number of bytes sent.

FieldName: ServiceStatus

Data Source/Type: Int

Explanations: Service status, such as 200.

FieldName: Win32Status

Data Source/Type: Long Integer

Explanations: Windows NT status code. 0 typically indicates success.

FieldName: Operation

Data Source/Type: Varchar(255)

Explanations: Type of the operation or command. For example, this may be USER for FTP or GET for WWW.

FieldName: Target

Data Source/Type: Varchar(255)

Explanations: Target of the operation. For example, this may be Default.htm.

FieldName: Parameters

Data Source/Type: Varchar(255)

Explanations: Any parameters for the operation. This can be either name/value pairs for invoking CGI or an ISAPI extension. It is a user name for the FTP command USER.

Create a System DSN

NOTE: This example uses SQL Server 7.0.

1. On the IIS computer, open Control Panel, double-click the ODBC data source, click the System DSN tab, and then click Add.

2. When the Create New Data Source window appears, click to select SQL Server, and then click Finish.

3. In the Name box, type HTTPLOG, type a description, and then click to select the SQL server that you want to connect to. If the SQL server is on the same computer, select (local).

4. Click Next.

5. In the creation wizard, map the SQL server name and the default database. Make sure that you click to select With Windows NT authentication using the network login ID for the computer that is running SQL Server.

6. Map the default database to the database where the template table resides.

7. Examine the client configuration and use the default Named Pipe setting. Make sure that the SQL server name is correct. If you want to, you can also click to select Save long query to a file and Save the statistics in the wizard.

8. At the end of the wizard, click Test the data source. Make sure that you have successfully connected to the computer that is running SQL Server, and then click OK to exit.

Configure IIS for ODBC Logging

1. In the ISM MMC, right-click the Web site, and then click Properties.

2. Click the Web Site tab.

3. In the Active log format list, click to select ODBC Logging. You can ignore the user name and password on the ODBC Logging Properties page if you selected Windows NT Integrated authentication when you set up the system DSN that is mapped to the computer that is running SQL Server.

4. Click Apply, and then click OK.NOTE: If an account is specified on the ODBC Logging Properties page, the Username field in the SQL Server table is blank or contains a dash (-). If a domain account is used, the account name appears in the SQL Server logging table.

5. : If an account is specified on the ODBC Logging Properties page, the In the ISM MMC, right-click the Web site, and then click Stop to stop your Web site.

6. : If an account is specified on the ODBC Logging Properties page, the Right-click the Web site, and then click Start to restart your Web site.

Recommendations for ODBC Logging

  • The company does not recommend IIS logging to a SQL Server table if the IIS computer is a busy server. Sending logging data to a SQL Server database for a busy Web site consumes system resources. In this case, you may want import the IIS logs to a SQL database later. For more information about importing IIS logs to SQL, click the following article numbers to view the articles in the Microsoft Knowledge Base:
  • 296085 (http://support.microsoft.com/kb/296085/) How to use SQL Server to analyze Web logs
  • 296093 (http://support.microsoft.com/kb/296093/) PrepWebLog utility prepares IIS logs for SQL bulk insert
  • By default, the logging configuration uses Named Pipes for the SQL Server connection. If you are using a remote computer that is running SQL Server, you may have to configure TCP/IP for the SQL Server connection.

Difference Between Windows IIS 6.0 And IIS 7.0

 

Difference Between Windows IIS 6.0 And IIS 7.0

IIS6.0


1.HTTP.sys was a HTTP-specific protocol listener for HTTP requests.
2.IIS 6.0 makes use of centralized configuration store
3.In IIS6.0, IIS would examine the request and perform its authentication routines and then afterwards pass it to ASP.NET so it could do a similar task.


IIS7.0


1.HTTP.sys remains the HTTP listener in IIS 7.0, but includes support for Secure Sockets Layer (SSL).To support services and applications that use protocols other than HTTP and HTTPS, you can use technologies such as Windows Communication Foundation (WCF).
2.The old centralized configuration store is replaced with new delegated configuration system based on a hierarchy of distributed XML configuration files. There are parent level and child level configurations and the parent level configuration can allow or deny changes to parent level settings at child level or all parent level settings can be inherited at the child level.
3.There is unified model to produce a new robust pipeline that provides the best of the both older models. IIS still supports all the old authentication protocols but also now supports forms authentication which can protect against all content types and does not rely on Windows accounts. This is great and I like this change. Passport authentication is not supported.

-------------------------------------------------------------------------------------------------------------

Internet Information Services (IIS) is the second most popular Web server application available, beat out only by Apache HTTP Server. It was created by Microsoft for use with Windows (both clients and servers). When Windows is installed, IIS is not turned on by default. It must be selected from optional features. IIS 6.0 is available with Windows Server 2003 and XP Professional. IIS 7.0 comes with Windows Server 2008 and Vista.
Architecture:
One of the main advantages of IIS 7.0 over 6.0 is the new modular architecture. Modules, units of code that perform authorization, authentication, logging and more, can be plugged in or out as needed. The server can be more lightweight because there is no need to install a feature, or module, unless it will be used. Administrators will be able to manage their environment easier. Developers will be able to create the optimum environment for their needs. Additionally, many hosting companies support the Microsoft URL Rewrite Module, which provides a way to perform redirects, send responses and abort requests based on customized rules. There are over 40 different modules that are available for installation during the IIS setup process.
Integration:
Before IIS 7.0, ASP.NET integrated with IIS by using an ISAPI extension. This essentially created two server pipelines, a pipeline within a pipeline, one for native ISAPI components and one for ASP.NET and other managed application components. IIS 7.0 provides a unified pipeline where native and managed components exist as modules. All modules, native and managed, can equally register for events in the pipeline. This also allows for a single point of administration for implementation, configuration and monitoring of all modules and server features. For those who are uncomfortable with or confused by this new integrated mode, IIS 7.0 still supports a classic mode, which is the same pipeline configuration as IIS 6.0. In classic mode, the ASP.NET pipeline runs entirely within the IIS pipeline.
Security:
IIS 7.0 supports both the IIS 6.0 authentication protocols and a new forms authentication. Forms authentication does not depend on Windows accounts and protects access to all types of content. IIS 7.0 offers two authorization solutions. The main difference being the way the authorization rules are processed. The newest model processes rules in order of child, parent, then grandparent. The old ASP.NET authorization process rules exactly the opposite. SSL host headers have been moved into the HTTP.SYS store. This allows SSL Certificates to be added to the server rather than the site, making it easy to deploy one certification to multiple sites. IP Restrictions are precisely the same in IIS 6.0 and 7.0. The only change is a new property, allow Unlisted, which makes for a simpler process when configuring global security policies.

Windows IIS 6.0 Request Process Architecture And Features

Overview of the Main Features and Architecture of IIS 6.0:

  • Internet Information Services (IIS) version 6.0 is a powerful Web server that provides a highly reliable, manageable, and scalable Web application infrastructure for all versions of Microsoft

Windows Server  2003.

  • IIS 6.0 provides many new features for administering and managing Web site security. IIS 6.0 is easy to administer through the interface and is secure by design, secure in deployment,

and highly scalable.

  • IIS 6.0provides a secure platform for publishing information on internal networks or on theInternet.
  • Microsoft has added many new features to this version of IIS. For example, the metabase is a simple Extensible Markup Language (XML) text file that is backed up automatically.The security model has been completely rebuilt to allow administrators to tightly control executable files. In IIS 6.0, applications can be better isolated in their own application pools for better performance, greater reliability, and easier monitoring.
  • The File Transfer Protocol (FTP) service is one of the services enhanced in IIS 6.0. IIS 6.0 has many new features, one of which is the ability to isolate FTP users in their own accounts by using Active Directory directory service. The other new features include User Isolation and Unicode Transformation Format-8 (UTF-8) support.

Main Features of IIS 6.0:

  • IIS 6.0 provides a secure platform for deploying and managing Web applications. IIS 6.0 includes new performance-enhancing features for both static and dynamic content, and new security features to ensure the ongoing integrity of the Web server. In IIS 6.0, the core components and architecture have been redesigned. This latest version of IIS also provides new features that make it more reliable, manageable, and scalable. With these changes, IIS 6.0 is significantly different from the earlier versions.

The improvements in IIS 6.0 can be categorized under four subjects:

reliability,manageability, security, and performance.

In this topic, you will learn about the features that are responsible for each of the improvements.

1 ) Improvement: Reliability

Feature    : Application isolation

Description:

IIS 6.0 can isolate Webapplications in separateapplication pools. Placing applications in their own pool minimizes the impact of other poorly behaving applications in other application pools. Application pools have configurable properties that separate the applications within them, from other application pools and from IIS 6.0 itself.

2) Improvement: Manageability

Feature    : IIS 6.0 metabase

Description:

IIS 6.0 stores configuration settings in an XML file. The earlier versions of IIS stored the metabase in a binary file. You can read, edit, and save the files by using IIS Manager, Metabase Explorer, or any

standard text editor tools. Metabase Explorer, which is included in the IIS 6.0 resource toolkit, requires the Microsoft .NET Framework.

Metabase Explorer allows you to edit the configuration settings by using a graphical interface.

3) Improvement: Security

3a) Feature    : Not installed by default

Description:

IIS 6.0 is not installed by default when you install the Standard,Enterprise, or Datacenter editions of the Windows Server 2003 operating system. IIS 6.0 is installed by default when you install the Webedition of the Windows Server 2003 operating system.

3b)Feature: Locked down by default

Description:

When you install IIS 6.0 in the Standard, Enterprise, or Datacenter editions of Windows Server 2003, the Web Service Extensions are locked down by default and will serve only static content.

This new security feature enables administrators to have control over the contents served by the Web server. Features for serving dynamic content, such as Active Server Pages (ASP), ASP.NET, Web

Distributed Authoring and Versioning (WebDAV), Microsoft Office FrontPage® Server Extensions, and server-side includes are not enabled. With the new security model, administrators can enable these

features according to their requirements. The new security model enables administrators to manage the attack surface of the Web server.

4) Improvement: Performance and Scalability

4a)Feature    : Kernel-mode caching

Description:

IIS 6.0 provides new kernelmode caching functionality that enhances the performance of applications like ASP.NET and ASP applications.

4b) Feature    : Demand start and idle timeout.

Description:

The demand start and idle timeout features ensure that an application pool does not consume system resources unless there are requests for its hosted applications.

The Request Processing Architecture in IIS 6.0:

IIS 6.0 has been redesigned to include a new request-processing architecture that isolates application processes, a feature that makes the Web server more reliable and scalable. The IIS 6.0 request

processing architecture has several features, such as isolation of application processes, kernel-mode queuing, and caching of user responses.

What is the request processing architecture?

The redesigned request processing architecture streamlines request processing by isolating certain processes in their own memory space and optimizing communication between kernel mode and user mode, thus enhancing the performance of the Web server. The request-processing architecture enables individual Web applications to function within a self-contained worker process. This environment prevents one application or Web site from stopping another and reduces the amount of time administrators spend restarting services to correct problems related to applications. The architecture has three main components: the kernel-mode Hypertext Transfer Protocol (HTTP) protocol stack (HTTP.sys), a user-mode administration and monitoring component called the WWW Publishing Service, and application pools.

Components of IIS 6.0 request processing architecture:

The three major components of the IIS 6.0 request processing architecture are: HTTP protocol stack (HTTP.sys). HTTP.sys is a kernel-mode Web listener that receives and places the client requests in a queue. Each application pool has a request queue. HTTP.sys validates the requests and sends only valid requests to the appropriate request queue.

Worker processes (W3WP.exe). Worker processes are user-mode processes, managed by the WWW Service Administration and Monitoring component. Worker processes handle application execution for the applications assigned to an application pool.

WWW Service Administration and Monitoring (W3SVC). The WWW Service Administration and Monitoring component manages the server configurations and the lifetime of the worker process. The WWW Service Administration and Monitoring component is concerned with the health of worker processes and application pools. W3SVC configures by using API’s HTTP.sys with the appropriate request queues, and these queues are managed by HTTP.sys. HTTP.sys routes the request to the appropriate pool, based on the configurations made by W3SVC at startup. The WWW Service

Administration and Monitoring component does not load or process any application code. The W3SVC is a Microsoft Windows® NT service. You can start or stop the W3SVC by using IIS Admin Service.

IIS 6.0 request processing:

The IIS 6.0 request processing involves the following steps:

1. When an HTTP request arrives at the kernel-mode HTTP protocol stack, HTTP.sys checks the validity of the request. If the request is invalid, it returns the appropriate HTTP error code to the requester.

HTTP.sys has its own error log, HTTPerr.log. Invalid requests get recorded in the HTTPerr.log and not in the Web service logs because the invalid requests do not reach the Web server. If the request is

valid, HTTP.sys places the request in the queue of the application pool and the respective worker process handles the request. If the requested page is already in the kernel mode cache, the page is sent

directly to the user.

2. When a request is received by the application pool, if there is no worker process to handle the request, a new worker process is started.

3. The worker process pulls the request from the queue, processes the request, and then sends the response back to HTTP.sys.

4. HTTP.sys sends the response back to the user.

Benefits of the IIS 6.0 request processing architecture:

The IIS 6.0 request processing architecture provides for the separation of operations of the Web server from the processing of application code while increasing the performance of the Web server. The request processing architecture:

  • Increases the speed at which HTTP requests are processed. W3SVC can initiate multiple worker processes to handle a request, and this increases the processing of HTTP requests.
  • Placing applications in their own pool minimizes the impact of other poorly behaving applications in other application pools
  • Reduces server restarts and eliminates WWW service shutdowns caused by failed applications.
  • Supports recycling of Web application pools that are not responding and of applications that consume a large amount of memory.
  • Supports recycling of Web application pools on a scheduled or periodic basis.

IIS 6 Basics| Windows IIS 6 Tutorials

IIS 6 Basics| Windows IIS 6 Tutorials

What’s IIS

  • Internet Information Services (IIS, formerly called Internet Information Server) is a set of Internet-based services for servers using Microsoft Windows.
  • It is the world’s second most popular web server in terms of overall websites, behind Apache HTTP Server.
  • As of June 2008 it served 35.39% of all websites according to Netcraft.[1] The servers currently include FTP, SMTP, NNTP, and HTTP/HTTPS.

Product History:

  • 1996 – V1 ships with WindowsNT 4.0

—> V2 & V3 releases came in follow-up SP releases

  • 1997 – V4 part of NT 4 Option Pack
  • 2000 – V5 installed by default in Windows 2000
  • 2003 – V6 released in Windows Server 2003
  • 2008 – V7  released in “Longhorn” Server

IIS 6.0 Architecture Overview:

  • IIS 6.0 is designed into two new components, the kernel mode HTTP protocol stack (HTTP.sys) and a user-mode administration and monitoring component.
  • HTTP.sys is a kernel mode protocol stack that queues and parses incoming HTTP requests and caches and returns application content. This component does not load any application code, making it more secure. HTTP.sys listens for requests and queues them as needed.
  • WWW Service Administration and Monitoring is a user mode process and configuration manager that delegates server operations and monitors the execution of application code. Like HTTP.sys this component does not load or process any application code.

Features-Increased Web server reliability and availability

  • IIS 6.0 features a new, fault-tolerant architecture with health monitoring and process recycling that significantly increases the reliability of your Web server infrastructure. IIS 6.0 ensures that one application’s problems don’t cause another application, or the server itself, to fail. These features increase the availability of your Web sites and applications and can reduce the time administrators spend managing these applications

Easier server management

  • IIS 6.0 features many new management tools designed to reduce the amount of time it takes to manage your Web server infrastructure. These features include a plain text XML configuration file that can be modified without having to stop the server, and command-line scripting. With these features, IIS 6.0 can increase the number of servers that a single administrator can manage.

Server consolidation

  • IIS 6.0 is a highly-scalable Web server that provides new opportunities for Web server consolidation. By combining a reliable architecture with kernel-mode cache performance, IIS 6.0 enables more applications to be hosted on a single server. Server consolidation can reduce staffing costs, hardware costs, and site management costs.

Faster application development

  • Faster application development With Windows Server 2003 and IIS 6.0, application developers benefit from a single, integrated application hosting environment. Building on IIS 6.0, the .NET Framework, and ASP.NET, Windows Server 2003 offers developers a broad choice of languages for rapid application development and fast, reliable hosting performance. IIS 6.0 also offers international support and support for the latest Web standards.

Increased Security:

Locked-down server

IIS 6.0 provides significantly improved security. To reduce the attack surface of systems, IIS 6.0 is not installed by default on Windows Server 2003—administrators must explicitly select and install it. IIS 6.0 ships in a locked-down state, serving only static content. Using the Web service extension node, Web site administrators can enable or disable IIS functionality based on the individual needs of the organization.

Web service extensions list

The default installation of IIS will not compile, execute, nor serve files with dynamic extensions. In order to have them served, each acceptable file extension must be added to the Web service extensions list. This requirement prevents anyone from calling a page with a dynamic extension that has not been secured.

Default low-privilege account

All IIS 6.0 worker processes—by default—run as Network Service user accounts, a new, built-in account type with limited operating system privileges, on Windows Server 2003. All ASP built-in functions always run as low-privileged accounts (anonymous user).

IIS 6.0 Improvements:

  • Security overhaul
  • XML-based metabase
  • Support for the Microsoft .NET Framework
  • Web-based administration
  • Support for Web gardens
  • Application isolation
  • New response cache architecture
  • Performance

IIS Services:

  • World Wide Web (WWW) publishing service
  • File Transfer Protocol (FTP) service
  • Simple Mail Transfer Protocol (SMTP) service
  • Network News Transfer Protocol (NNTP) service

IIS Isolation Modes:

  • IIS 6.0 runs in one of two modes of operational isolation

—> Worker process isolation mode

—> IIS 5.0 isolation mode (sometimes called “compatibility mode”)

  • Fresh installs default to worker process isolation mode
  • Upgrades from IIS 5 or earlier default to IIS 5.0 isolation mode
  • Cannot run both modes on one server – must be one or the other

Finally:

  • Clearly, the platform of choice for the foreseeable future is the Internet. With so many users on the Internet every day, and with so many new applications on the way, the world’s Web servers will certainly experience an increase in demand. IIS 6.0 has been designed to meet this demand. Its far-reaching improvements enhance performance, reliability, and scalability, and secure a spot for IIS 6.0 and the .NET platform as computing platforms for the millennium

IIS 7.0-Successor of IIS 6.0:

  • Windows Server 2008 featuring Internet Information Services 7.0 is a powerful Web application and services platform that delivers rich Web-based experiences. It offers improved administration and diagnostic tools to help achieve lower infrastructure costs on a variety of popular development platforms. With improved reliability and scalability, IT professionals and developers can manage the most demanding Web serving environments, from a single Web server to a large Web farm.

Command-Line Scripts for IIS 6.0 in Windows Server 2003

Command-Line Scripts for IIS 6.0 in Windows Server 2003

  • IIS 6.0 includes supported scripts that you can find in the systemroot\System32 directory. These VBScript scripts use the IIS WMI provider to manage configuration settings in the IIS metabase.
  • When you use these scripts to create a new site or virtual directory, you can specify the basic properties that are needed to create the site or directory and identify its contents. The scripts apply the same default properties that IIS Manager uses to create new sites or virtual directories, and they adhere to the same rules for inheriting properties.
  • To configure more advanced properties for a site or virtual directory, use IIS Manager. Alternatively, you can build an XML template that contains the properties you want to apply to a new Web site or virtual directory and then use the Iiscnfg.vbs script to apply this template to any Web site or virtual directory in the IIS metabase.
  • The computer that runs the command must be running Microsoft® Windows®  XP Professional or Windows Server 2003. The computer that the command affects must be running Windows Server 2003 with IIS 6.0. You cannot use these scripts to manage IIS 6.0 on clients running Windows XP Professional because Windows XP runs with IIS 5.1.

 

Iisweb.vbs
Web sites
Create, delete, start, stop, pause, and query or list Web sites.
Managing Web Sites

Iisftp.vbs
FTP sites
Create, delete, start, stop, pause, and query or list FTP sites.

Query and set Active Directory properties for a users FTP home directory (use in FTP user isolation).

Managing FTP Sites

Setting Active Directory User Isolation

Iisvdir.vbs
Web virtual directories
Create, delete, or list the Web virtual directories of a given root.
Managing Web Virtual Directories

Iisftpdr.vbs
FTP virtual directories
Create, delete, or list the FTP virtual directories of a given root.
Managing FTP Virtual Directories

iisback.vbs
Back up and restore IIS configuration
Create, delete, restore, and list backup copies of IIS configuration.
Managing IIS Configurations

Iiscnfg.vbs
Export or import IIS configuration
Export or import an IIS configuration to or from an XML file; copy the metabase and schema to another computer; and save configuration changes to disk.
Managing IIS Configurations

Iisext.vbs
Applications and dynamic content services
Configure and manage applications, Web service extensions (like ASP and ASP.NET), and individual files.
Managing Applications and Web Service Extensions

Iisapp.vbs
Application pools and their worker processes
List the worker processes (W3wp.exe) currently running and the application pool each one serves.

Window IIS Fundamentals| Fundamentals Of IIS

Window IIS Fundamentals| Fundamentals Of IIS

Difference Between IIS And Apache| Difference Between Apache And IIS

Difference Between IIS And Apache| Difference Between Apache And IIS

Apache is a software foundation that develops and provides open source software that is meant to run web servers. Their primary product is their HTTP server which is the most popular HTTP server in use today. IIS or Internet Information Services is the software pack developed by Microsoft to provide their Windows operating system the ability to host internet services. IIS is second only to HTTP as the most used HTTP server in the world.

 

The Apache web server is very popular due to the fact that is free. This is very advantageous to those who are just trying out web publishing and is still unsure about it. Apache is most commonly included in a totally free web server solution called LAMP (Linux/Apache/MySQL/PHP) which is a collection of open source software that would totally handle all of your web publishing needs from the OS down to the scripting language. Aside from being free, the open source community is also a good source of support for users who have the time and patience to ask for answers.

 

IIS is from Microsoft and thus it would only run on the Microsoft Windows OS. Although it might seem to be free, the fact that you need to buy Windows to use it shatters that dream. The clear advantage with running IIS is the fact most people are already familiar with the Windows operating system and IIS would be a lot easier to learn for Windows users. IIS also comes with the support of the .NET Framework released by Microsoft; in fact, ASPX scripts are exclusive to IIS. Support for IIS is provided by Microsoft which is an assurance that you would have answers to your problems direct from the makers themselves.

 

The IIS ‘“ Windows combo is both a boon and bane for users. The fact that they are made by the same company assures you that they would operate at the best capacity with each other. The only problem with the Windows OS is its too popular and a lot of malware, virus, and trojans exist on the Windows OS. Even more are being created everyday and that might pose a threat in the future.

Summary:

1. Apache is free while IIS is packaged with Windows.

2. IIS only runs on Windows while Apache can run on almost any OS including UNIX, Apple’s OS X, and on most Linux Distributions.

3. ASPX runs only in IIS.

4. IIS has a dedicated staff to answer most problems while support for Apache comes from the community itself.

5. IIS is optimized for Windows because they are from the same company.

6. The Windows OS is prone to security risks.

Important Transaction Codes For SAP Basis Administration

Common Transaction Codes For Basis Administration

Common Transaction Codes for Basis Administration

AL01SAP Alert MonitorSE14Utilities for Dictionary TablesSSM0Menu Maintenance and Test
AL02Database Alert MonitorSE15ABAB/4 Repository Info SystemSSM1SAP and Company Menu administration
AL03Operating System Alert MonitorSE30ABAP/4 Run time AnalysisST01System Trace
AL04Monitor Call DistributionSE38ABAP/4 EditorST02Setup/Tune Buffers
AL05Monitor Current WorkloadSE54Generate Table ViewST03Performance SAP statistics, Workload
AL06Performance: Upload/DownloadSE61R/3 DocumentationST04Select Database Activities
AL07Early Watch ReportSE80ABAP/4 Development WorkbenchST05SQL Trace
AL08Users Logged OnSE91Maintain MessagesST06Operating System Monitor
AL10Download to Early WatchSE92Maintain System Log MessagesST07Application Monitor
AL11DirectoriesSE93Maintain Transaction CodesST08Network Monitor
AL12Display Table Buffer (Exp session)SH01Online Help: F1 Help ServerST09Network Alert Monitor
AL13Display Shared Memory (Expert mode)SH03Call Extended HelpST10Table Call Statistics
AL15Customize SAPOSCOL destinationSICKInstallation CheckST11Display Developer Traces
AL18Local File System MonitorSLDBLogical Databases (Tree Structure)ST12Application Monitor
AL19Remote File System MonitorSLW4Translation: Application HierarchyST14Application Analysis
AL20Early Watch Data Collector ListSM01Lock TransactionsST22ABAP/4 Runtime Error Analysis
DB01Analyze Exclusive Lock WaitsSM02System MessagesSTATLocal Transaction Statistics
DB02Analyze Tables and IndexesSM04User OverviewSTDRTADIR Consistency Check
DB03Parameter Changes in DBSM12Display and Delete LocksSTUNPerformance Monitor Menu
DB11Early Watch Profile MaintenanceSM13Display Upgrade RecordsSU01Maintain User Records
DB12Overview of Backup LogsSM21System LogSU02Maintain Authorization Profiles
DB13Database Administration CalendarSM31Table MaintenanceSU03Maintain Authorizations
DB14Show DBA Action LogsSM35Batch Input MonitoringSU10Mass Changes to User Master Records
PFCGProfile Generator – Activity GroupsSM36Background Job SchedulerSU12Mass Changes to User Master Records
RZ01Job Scheduling MonitorSM37Background Job OverviewSU20Maintain Authorization Fields
RZ02Network Graphics for SAP InstancesSM38Queue Maintenance TransactionSU21Maintain Authorization Objects
RZ03Presentation, Control SAP InstancesSM39Job AnalysisSU22Auth Objects Usage in Transactions
RZ04Maintain SAP InstancesSM50Workprocess OverviewSU24Maintain Profile Generator Tables
RZ06Alert Thresholds MaintenanceSM51List of SAP ServersSU25Copy SAP to Customer Prof Gen Tables
RZ08SAP Alert MonitorSM63Display/Maintain Operation Mode SetsSU30Overall Authorization Checks
RZ10Maintenance of Profile ParametersSM64Release of an EventSU50Maintain User Defaults
RZ11Profile ParametersSM65Background Processing Analysis ToolSU51Maintain User Address
SAR    Maintain Transaction CodesSM66System-wide Work Process OverviewSU52Maintain User Parameters
SARAArchive ManagementSM67Job SchedulingSU53Analyze Authorization Error
SCATComputer Aided Test ToolSM68Job AdministrationSU56Display list of User Authorizations
SCC0Client CopySMGWGateway MonitorSVERABAP/4 Verification
SCU3Table HistorySMLGLogon GroupsSVMCStart View Maintenance with Memory
SD11Data ModelerSMXDisplay Own JobsSWT0Configure Workflow Trace
SDBEMatchcode Objects (test)SOFFSAPoffice: Area MenuSWU8Technical Trace On/Off
SE01Transports and Correction SystemSP00Spool and Related AreasSWU9Display Technical Trace
SE02Environment AnalyzerSP01Output ControllerSWUDDiagnostic Tools
SE03Transport UtilitiesSP11TemSe DirectorySWUEInitiate Event
SE07Transport System Status DisplaySP12TemSe AdministrationSWUFWorkflow Monitor
SE09Workbench OrganizerSPITOutput ControllerSWUHTest Method
SE10Customizer OrganizerSPADSpool AdministrationSWWDSwitch on Work Item Error Monitoring
SE11ABAP/4 Dictionary MaintenanceSPAMSAP Patch ManagerSYNTDisplay Syntax Trace Output
SE12ABAP/4 Dictionary DisplaySPATSpool Administration – testTU01Call Statistics
SE13Maintain Technical Settings (Tables)SPDDDisplay Modified DDIC objectsTU02Active Instance Profile parameters