News
It's not enough to get an IIS Web server up and running. You must also be able to manage the log files to track site utilization and user activity.
The Cranefly hacking group, aka UNC3524, uses a previously unseen technique of controlling malware on infected devices via Microsoft Internet Information Services (IIS) web server logs.
IIS logs, on by default, can slowly eat up your hard drive if you have a bunch of sites running or just a lot of traffic. Here's how to keep them in check.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results