World Library  
Flag as Inappropriate
Email this Article

Internet Information Services


Internet Information Services

Internet Information Services
Screenshot of IIS Manager console of Internet Information Services 8.5
Developer(s) Microsoft
Stable release 10 / 29 July 2015 (2015-07-29)
Development status Active
Written in C++[1]
Operating system Windows NT
Available in Same languages as Windows
Type Web server
License Part of Windows NT (same license)
Website .netiis

Internet Information Services (IIS, formerly Internet Information Server) is an extensible web server created by Microsoft for use with Windows NT family.[2] IIS supports HTTP, HTTPS, FTP, FTPS, SMTP and NNTP. It has been an integral part of the Windows NT family since Windows NT 4.0, though it may be absent from some editions (e.g. Windows XP Home edition), and is not active by default.


  • History 1
  • Features 2
    • IIS Express 2.1
    • Extensions 2.2
  • Usage 3
  • Security 4
  • See also 5
  • References 6
  • External links 7


The first Microsoft web server was a research project at the European Microsoft Windows NT Academic Centre (EMWAC), part of the University of Edinburgh in Scotland, and was distributed as freeware.[3] However, since the EMWAC server was unable to handle the volume of traffic going to, Microsoft was forced to develop its own web server, IIS.[4]

Almost every version of IIS was released either alongside or with a version of Microsoft Windows:

  • IIS 1.0 was initially released as a free add-on for Windows NT 3.51.
  • IIS 2.0 was included with Windows NT 4.0.
  • IIS 3.0, which was included with Service Pack 2 of Windows NT 4.0, introduced the Active Server Pages dynamic scripting environment.[5]
  • IIS 4.0 was released as part of the "Option Pack" for Windows NT 4.0. It introduced the new MMC-based administration application.
  • IIS 5.0 shipped with Windows 2000 and introduced additional authentication methods, support for the WebDAV protocol, and enhancements to ASP.[6] IIS 5.0 also dropped support for the Gopher protocol[7]
  • IIS 5.1 was shipped with Windows XP Professional, and was nearly identical to IIS 5.0 on Windows 2000.
  • IIS 6.0, included with Windows Server 2003 and Windows XP Professional x64 Edition, added support for IPv6 and included a new worker process model that increased security as well as reliability.[8]
  • IIS 7.0 was a complete redesign and rewrite of IIS, and was shipped with Windows Vista and Windows Server 2008. IIS 7.0 included a new modular design that allowed for a reduced attack surface and increased performance. It also introduced a hierarchical configuration system allowing for simpler site deploys, a new Windows Forms-based management application, new command-line management options and increased support for the .NET Framework.[9] IIS 7.0 on Vista does not limit the number of allowed connections as IIS on XP did, but limits concurrent requests to 10 (Windows Vista Ultimate, Business, and Enterprise Editions) or 3 (Vista Home Premium). Additional requests are queued, which hampers performance, but they are not rejected as with XP.
  • IIS 7.5 was included in Windows 7 (but it must be turned on in the side panel of Programs and Features) and Windows Server 2008 R2. IIS 7.5 improved WebDAV and FTP modules as well as command-line administration in PowerShell. It also introduced TLS 1.1 and TLS 1.2 support and the Best Practices Analyzer tool and process isolation for application pools.[10]
  • IIS 8.0 is only available in Windows Server 2012 and Windows 8. IIS 8.0 includes SNI (binding SSL to hostnames rather than IP addresses), Application Initialization, centralized SSL certificate support, and multicore scaling on NUMA hardware, among other new features.
  • IIS 8.5 is included in Windows Server 2012 R2 and Windows 8.1. This version includes Idle worker-Process page-out, Dynamic Site Activation, Enhanced Logging, ETW logging, and Automatic Certificate Rebind.
  • IIS 10 is included in Windows Server 2016 and Windows 10. This version includes support for HTTP/2.[11]

All versions of IIS prior to 7.0 running on client operating systems supported only 10 simultaneous connections and a single website.

Microsoft was criticized by vendors of other Web server software, including O'Reilly & Associates and Netscape Communications Corp., for its licensing of early versions of Windows NT; the "Workstation" edition of the OS permitted only ten simultaneous TCP/IP connections, whereas the more expensive "Server" edition, which otherwise had few additional features, permitted unlimited connections but bundled IIS. It was inferred that this was intended to discourage consumers from running alternative Web server packages on the cheaper edition.[12] Netscape wrote an open letter to the Antitrust Division of the U.S. Department of Justice regarding this distinction in product licensing, which it asserted had no technical merit.[13]


IIS 6.0 and higher support the following authentication mechanisms:[14]

IIS 7.0 has a modular architecture. Modules, also called extensions, can be added or removed individually so that only modules required for specific functionality have to be installed. IIS 7 includes native modules as part of the full installation. These modules are individual features that the server uses to process requests and include the following:[16]

  • Security modules: Used to perform many tasks related to security in the request-processing pipeline, such as specifying authentication schemes, performing URL authorization, and filtering requests.
  • Content modules: Used to perform tasks related to content in the request-processing pipeline, such as processing requests for static files, returning a default page when a client does not specify a resource in a request, and listing the contents of a directory.
  • Compression modules: Used to perform tasks related to compression in the request-processing pipeline, such as compressing responses, applying Gzip compression transfer coding to responses, and performing pre-compression of static content.
  • Caching modules: Used to perform tasks related to caching in the request-processing pipeline, such as storing processed information in memory on the server and using cached content in subsequent requests for the same resource.
  • Logging and Diagnostics modules: Used to perform tasks related to logging and diagnostics in the request-processing pipeline, such as passing information and processing status to HTTP. sys for logging, reporting events, and tracking requests currently executing in worker processes.

IIS 7.5 includes the following additional or enhanced security features:[17]

  • Client certificate mapping
  • IP security
  • Request filtering
  • URL authorization

Authentication changed slightly between IIS 6.0 and IIS 7, most notably in that the anonymous user which was named "IUSR_{machinename}" is a built-in account in Vista and future operating systems and named "IUSR". Notably, in IIS 7, each authentication mechanism is isolated into its own module and can be installed or uninstalled.[15]

IIS 8.0 offers new features targeted at performance and easier administration. The new features are:

  • Application Initialization: a feature that allows an administrator to configure certain applications to start automatically with server startup. This reduces the wait time experienced by users who access the site for the first time after a server reboot.[18]
  • Splash page during application initialization: the administrator can configure a splash page to be displayed to the site visitor during an application initialization.[18]
  • 4.5 support: With IIS 8.0, 4.5 is included by default, and IIS also offers several configuration options for running it side-by-side with 3.5.[19]
  • Centralized SSL certificate support: a feature that makes managing certificates easier by allowing the administrator to store and access the certificates on a file share.[20]
  • Multicore scaling on NUMA hardware: IIS 8.0 provides several configuration options that optimize performance on systems that run NUMA, such as running several worker processes under one application pool, using soft or hard affinity and more.[21]
  • WebSocket Protocol Support[22]
  • Server Name Indication (SNI): SNI is an extension to Transport Layer Security, which allows binding of multiple websites with different hostnames to one IP address (similar to how Host Headers are used for non-SSL sites).[23]
  • Dynamic IP Address Restrictions: a feature that enables an administrator to dynamically block IPs or IP ranges that hit the server with a large number of requests[24]
  • CPU Throttling: a set of controls that allow the server administrator to control CPU usage by each application pool in order to optimize performance in a multi-tenant environment[25]

IIS 8.5 has several improvements related to performance in large-scale scenarios, such as those used by commercial hosting providers and Microsoft's own cloud offerings. It also has several added features related to logging and troubleshooting. The new features are:

  • Idle worker-Process page-out: a function to suspend idle site to reduce the memory footprint of idle sites[26]
  • Dynamic Site Activation: a feature that registers listening queues only to sites that have received requests[27]
  • Enhanced Logging: a feature to allow collection of Server variables, request headers and response headers in the IIS logs[28]
  • ETW logging: an ETW provider which allows collecting real-time logs using various Event-tracing tool[29]
  • Automatic Certificate Rebind: a feature that detects when a site certificate has been renewed, and automatically rebinds the site to it[30]

IIS Express

IIS Express, a lightweight version of IIS, is available as a standalone freeware server and may be installed on Windows XP with Service Pack 3 and subsequent versions of Microsoft Windows. IIS 7.5 Express supports only the HTTP and HTTPS protocols.[31] IIS Express can be downloaded separately[32] or as a part of WebMatrix.[33]


IIS releases new feature modules between major version releases to add new functionality. The following extensions are available for IIS 7.5:

  • FTP Publishing Service: Lets Web content creators publish content securely to IIS 7 Web servers with SSL-based authentication and data transfer.[34]
  • Administration Pack: Adds administration UI support for management features in IIS 7, including ASP.NET authorization, custom errors, FastCGI configuration, and request filtering.[35]
  • Application Request Routing: Provides a proxy-based routing module that forwards HTTP requests to content servers based on HTTP headers, server variables, and load balance algorithms.[36]
  • Database Manager: Allows easy management of local and remote databases from within IIS Manager.[37]
  • Media Services: Integrates a media delivery platform with IIS to manage and administer delivery of rich media and other Web content.[38]
  • URL Rewrite Module: Provides a rule-based rewriting mechanism for changing request URLs before they are processed by the Web server.[39]
  • WebDAV: Lets Web authors publish content securely to IIS 7 Web servers, and lets Web administrators and hosters manage WebDAV settings using IIS 7 management and configuration tools.[40]
  • Web Deployment Tool: Synchronizes IIS 6.0 and IIS 7 servers, migrates an IIS 6.0 server to IIS 7, and deploys Web applications to an IIS 7 server.[41]


According to Netcraft, on 13 February 2014, IIS is the second most popular web server in the world, behind Apache HTTP Server with a market share of 32.80%. It shows an increase of 3.38% in comparison to the previous month. Netcraft shows a rising trend in market share for IIS, since 2012.[42] A day later, however, the W3Techs shows different results. According to W3Techs, IIS is the third most used web server behind Apache HTTP Server (1st place) and Nginx. Furthermore, it shows a consistently falling trend for IIS use since February 2013.[43]


IIS 4 and IIS 5 were affected by the CA-2001-13 security vulnerability which led to the infamous Code Red attack;[44] however, both versions 6.0 and 7.0 have no reported issues with this specific vulnerability.[45][46] In IIS 6.0 Microsoft opted to change the behaviour of pre-installed ISAPI handlers,[47] many of which were culprits in the vulnerabilities of 4.0 and 5.0, thus reducing the attack surface of IIS. In addition, IIS 6.0 added a feature called "Web Service Extensions" that prevents IIS from launching any program without explicit permission by an administrator.

By default IIS 5.1 and earlier run websites in a single process running the context of the System account,[48] a Windows account with administrative rights. Under 6.0 all request handling processes run in the context of the Network Service account, which has significantly fewer privileges, so that should there be a vulnerability in a feature or in custom code it won't necessarily compromise the entire system given the sandboxed environment these worker processes run in.[49] IIS 6.0 also contained a new kernel HTTP stack (http.sys) with a stricter HTTP request parser and response cache for both static and dynamic content.[50]

According to Secunia, as of June 2011, IIS 7 had a total of six resolved vulnerabilities while[46] IIS 6 had a total of eleven vulnerabilities, out of which one was still unpatched. The unpatched security advisory has a severity rating of 2 out of 5.[45]

In June 2007, a Google study of 80 million domains concluded that while the IIS market share was 23% at the time, IIS servers hosted 49% of the world's malware, the same as Apache servers whose market share was 66%. The study also observed the geographical location of these dirty servers and suggested that the cause of this could be the use of pirated copies of Windows that could not obtain security updates from Microsoft.[51] In a blog post on 28 April 2009, Microsoft noted that it supplies security updates to everyone without genuine verification.[52][53]

The 2013 mass surveillance disclosures made it more widely known that IIS is particularly bad in supporting perfect forward secrecy (PFS), especially when used in conjunction with Internet Explorer. Possessing one of the long term asymmetric secret keys used to establish a HTTPS session should not make it easier to derive the short term session key to then decrypt the conversation, even at a later time. Diffie–Hellman key exchange (DHE) and elliptic curve Diffie–Hellman key exchange (ECDHE) are in 2013 the only ones known to have that property. Only 30% of Firefox, Opera, and Chromium Browser sessions use it, and nearly 0% of Apple's Safari and Microsoft Internet Explorer sessions.[54]

See also


  1. ^ Lextrait, Vincent (February 2010). "The Programming Languages Beacon, v10.0". Retrieved 12 February 2010. 
  2. ^ "Running IIS 6.0 as an Application Server (IIS 6.0)".  
  3. ^ "Windows NT Internet Servers".  
  4. ^ Kramer, Dave (24 December 1999). "A Brief History of Microsoft on the Web".  
  5. ^ "Microsoft ASP.NET 2.0 Next Stop on Microsoft Web Development Roadmap". 
  6. ^ "Chapter 1 - Overview of Internet Information Services 5.0". Retrieved 25 October 2010. 
  7. ^ "Chapter 2 - Managing the Migration Process". Retrieved 27 June 2012. 
  8. ^ "What's New In IIS 6.0?". Retrieved 25 November 2010. 
  9. ^ "IIS 7.0: Explore The Web Server For Windows Vista and Beyond". Retrieved 25 November 2010. 
  10. ^ "What's New in Web Server (IIS) Role in Windows 2008 R2". Retrieved 25 November 2010. 
  11. ^ Mike Bishop; David So (September 11, 2015). "HTTP/2 on IIS". Microsoft. 
  12. ^ "Netscape goes to jail, does not collect $200". InfoWorld. Retrieved 12 April 2014. 
  13. ^ "Differences Between NT Server and Workstation Are Minimal". O'Reilly Media. Retrieved 12 April 2014. 
  14. ^ "Authentication Methods Supported in IIS 6.0 (IIS 6.0)". IIS 6.0 Documentation.  
  15. ^ a b "Changes Between IIS 6.0 and IIS 7 Security".  
  16. ^ Templin, Reagan (11 August 2010). "Introduction to IIS 7 Architecture".  
  17. ^ "Available Web Server (IIS) Role Services in IIS 7.5". Microsoft TechNet.  
  18. ^ a b Eagan, Shaun (29 February 2012). "IIS 8.0 Application Initialization". IIS Blog.  
  19. ^ Yoo, Won (29 February 2012). "IIS 8.0 configuration management". IIS Blog.  
  20. ^ Eagan, Shaun (29 February 2012). "IIS 8.0 Centralized SSL certificate support". IIS Blog.  
  21. ^ McMurray, Robert (29 February 2012). "IIS 8.0 Multicore Scaling on NUMA Hardware". IIS Blog.  
  22. ^ "IIS 8.0 WebSocket protocol support". IIS Blog.  
  23. ^ Eagan, Shaun (29 February 2012). "IIS 8.0 Server Name Indication". IIS Blog.  
  24. ^ McMurray, Robert (29 February 2012). "IIS 8.0 Dynamic IP Address Restrictions". IIS Blog.  
  25. ^ Eagan, Shaun (29 February 2012). "IIS 8.0 CPU Throttling". IIS Blog.  
  26. ^ Benari, Erez (26 June 2013). "Idle Worker-process Page Out". IIS Blog.  
  27. ^ Benari, Erez (3 July 2013). "Dynamic Site Activation". IIS Blog.  
  28. ^ Benari, Erez (10 July 2013). "Enhanced Logging". IIS Blog.  
  29. ^ Benari, Erez (15 July 2013). "ETW Logging". IIS Blog.  
  30. ^ Benari, Erez (3 September 2013). "Automatic Certificate rebind". IIS Blog.  
  31. ^ "IIS Express FAQ".  
  32. ^ "Internet Information Services (IIS) 7.5 Express". Download Center.  
  33. ^ "IIS Express Overview".  
  34. ^ "FTP Publishing Service".  
  35. ^ "Administration Pack".  
  36. ^ "Application Request Routing".  
  37. ^ "Database Manager".  
  38. ^ "IIS Media Services".  
  39. ^ "URL Rewrite".  
  40. ^ "WebDAV Extension".  
  41. ^ "Web Deploy 2.0".  
  42. ^ "February 2014 Web Server Survey".  
  43. ^ "Usage statistics and market share of Microsoft-IIS for websites". w3techs. Q-Success. Archived from the original on 8 February 2014. 
  44. ^ "CA-2001-13 Buffer Overflow In IIS Indexing Service DLL". CERT® Advisory.  
  45. ^ a b "Vulnerability Report: Microsoft Internet Information Services (IIS) 6". Secunia. Secunia ApS. Retrieved 1 July 2011. 
  46. ^ a b "Vulnerability Report: Microsoft Internet Information Services (IIS) 7.x". Secunia. Secunia ApS. Retrieved 1 July 2011. 
  47. ^ "IIS Installs in a Locked-Down Mode (IIS 6.0)".  
  48. ^ "How To: Run Applications Not in the Context of the System Account in IIS (Revision 5.1) Microsoft Corporation". 7 July 2008. Retrieved 20 July 2007. 
  49. ^ Henrickson, Hethe; Hofmann, Scott R. (2003). "Chapter 15: ASP.NET Web Services". IIS 6: the complete reference. New York City: McGraw-Hill Professional. p. 482.  
  50. ^ Henrickson, Hethe; Hofmann, Scott R. (2003). "Chapter 1: IIS Fundamentals". IIS 6: the complete reference. New York City: McGraw-Hill Professional. p. 17.  
  51. ^ "Web Server Software and Malware". 
  52. ^ "Windows Pirates Encouraged to Install Security Updates".  
  53. ^ Cooke, Paul (27 April 2009). "Who Gets Windows Security Updates?". Windows Security Blog.  
  54. ^ SSL: Intercepted today, decrypted tomorrow, Netcraft, 25 June 2013.

External links

  • Official website
  • IIS on Server and Cloud Platform portal
  • Security Guidance for IIS on TechNet
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.