Additional Security Methods
You can use methods other than network topology to secure and monitor your network. The rest of this chapter explains these methods, which include:
- Using third-party router packet filtering to prevent unwanted access.
- Configuring user account security to control access through the IUSR_computername account.
- Using file system security to prevent access to portions of a disk (or partition) and audit file use.
- Using the security log in Event Viewer to audit access to the computer running Internet Information Server and to all NTFS files available through Internet Information Server.
- Using Internet Information Server logs to track use of your IIS services.
For more information about Windows NT security as it relates to Internet Information Server, see the Internet Information Server Installation and Administration Guide.