1. Custom error pages
Although custom error pages are simple, only a few administrators have effectively used it. Administrators can map HTTP error messages to absolute URLs on the server or to a file in MMC. More detailed information can be found here. If you think this is too much trouble, if you want an easier way, or if you want developers to define their own error pages and don't want them to have access to MMC, you can use a tool like Customer Error.
2. MetaBase Research
If you think Apache is powerful because it has a configuration file, then you should take a look at how good IIS MetaBase is. With MetaBase, administrators can do everything about IIS, such as creating a virtual directory; stopping, starting, or pausing a Web site; creating, deleting, disabling, or enabling applications. Microsoft provides a visualization tool called MetaEdit to help you read and write MetaBase, you can download the latest version here. In order to use MetaBase more effectively, you should try the command line interface -- IIS Administration Script, referred to as adsutil.vbs. You can find it in C:\\inetpub\\adminscripts or %SystemRoot%\\system32\\inetsrv\\adminsamples. .
Note: MetaBase is very important for the normal operation of the Web site, do not destroy it. Remember: you must back up before making any changes.
3. Automatically correct URL spelling errors
Apache advocates are always bragging about some of Apache's small features, the coolest of which is "Automatically correct URL spelling errors", now IIS administrators can also play these small functions, using URLSpellCheck to automatically correct URL misspellings. To do a trial: www.urlspellcheck.com/fak.htm and www.urlspellcheck.com/faq1.htm, how, the second wrong spelling will be corrected automatically.
4. Rewriting URLs
Apache advocates have always boasted of the power of mod_rewrite. Now, there are so many such products for IIS, many of which are better than mod_rewrite. Because you use mod_rewrite, you must be familiar with regular expressions. Try it: IISWrite or ISAPI rewrite.
5. Detecting Browsers
Suppose everyone on the browsing site uses the same browser or the same screen size is obviously stupid. You can use javascript to access the visitors. The browser performs the test. If you are using IIS, you will have a better choice --Cyscape's BrowserHawk, there is no product in the Apache world. Cyscape recently launched a new product called CuntryHawk, which can be used to detect the region (country) where the visitor is located. Unfortunately, I still don't have language sensitive or regionally sensitive content to use it.
6. Site Content Compression
IIS 5 has a built-in compression feature. To be honest, it's awful, use pipeboost.
7. Web Application Cache
You can set the expiration time of different files or directories, open the IIS Information Server, right click on the site content, click on Properties, and pop up the form. You can make the corresponding settings. If you want developers to set it up, use CacheRight and XCache.
It takes some time and money to use the cache effectively, but when you see the traffic increase, the site diary becomes small because there are no innumerable 304 responses, and the bandwidth traffic is greatly reduced when you I will understand why I have to do this. There aren't many sites with good cache settings. On the contrary, articles about its benefits are a lot on the Internet. Let's take a look at these: Brian Davidson's page, Mark Nottingham, and what AOL has to say.
8. Tuning the server
Tuning the server is not a small problem and requires a monograph to explain it. There are some good basic tutorials and help on the web, such as Brett Hill and Microsoft's own Knowledge Base article. Of course, if you don't want to spend these hours, use this -- XTune.
9. Strengthening the security of the site
There are a lot of people attacking the site now, but as long as you are willing to pay a little effort, you will not be a one who can only sit and beat. fool. Finding your server information and operating system information is the first target of the attacker, so first, don't expose your HTTP headers to let others know that you are running IIS, use the software such as ServerMask to remove or replace the HTTP headers. . Second, you can further install your server environment by removing unnecessary file extensions. In addition, you can also scan for problematic URL requests, and Microsoft provides you with a free tool, URLScan.
10. Patches, patches, patches!
You should download and install the latest patches. You can go to the Microsoft site or go to http://www.cert.org/and use IIS as a keyword query.
Ok, this is my summary of IIS Management 10. Some of these 10 are not necessary in IIS 6, but for W2k and NT IIS administrators, using these 10 can make you sleep well.
In the LAN working environment, the network administrator often manages the serve
My configuration is AMD X4 955 processor + 770 motherboard + two 500GB hard drives
Although blade servers have been a constant data center device for many years, the situation has cha
issue Windows Hyper-V Server 2008 R2 supports up Description Windows Hyper-V Server 2008 R2 supp
Avoid running out of servers Parsing virtualized capacity planning
IIS do WEB server can not download some Chinese file name solution
A few things you need to know before buying a server (on)
Add php and mysql commands to environment variables under linux system
The time synchronization solution
Centos time synchronization method
Sendmail mailbox server configuration
Basic methods for enterprise maintenance of server security
System security: solve the problem of improving sshd service security
Open apache or nginx webpage gzip compression
Getting started with DNS (network domain name) resolution failure
Windwos system practical tips 60
Exposing the seven unscrupulous services in Windows
Method for registering 32-bit COM components in a 64-bit operating system on a computer
How does win7 set the icon small window display mode on the taskbar?
Burn music CDs with Windows XP
Teach you to apply for Windows Server 2008 serial number
How to make others not see the system disk information
ASUS Intel version Win8 tablet VivoTab quietly logged in
How to remove the Windows 8 system icon Xiao Huang lock restrictions