Use URLScan to lockdown IIS.

URLScan 2.0 for IIS 4.0 and IIS 5.0 has two primary functions. It can be used to apply a pre-defined security template...

to a Windows 2000 or NT 4.0 Server system hosting IIS to lock down the server. It can also be used as an ISAPI filter to prevent incoming URLs from performing malicious actions. The URL filtering can block incoming URLs based on:

  • Request of restricted methods.
  • Use-specific file extensions.
  • Use-suspect URL composition.
  • Use of non-ASCII characters in a URL.
  • Use of specific strings of characters in a URL.
  • Use of specific headers in a service request.

URLScan can be fine-tuned so it only allows requests for legitimate functions and data to be passed to the IIS service engine. It has the ability to allow or block access to CGI programs, WebDAV, FrontPage Server Extensions, Index Server access, Internet printing, and Server side includes.

With a bit of planning and customizing of its security templates and initialization file, URLScan can become a key element in your IIS security lockdown scheme. Once installed, it will launch itself automatically each time IIS is launched (i.e. at bootup). However, it is important to point out that this tool simply alters built-in security controls based on a template and accepts or rejects URLs based on the parameters you define. It does not take the place of installing hotfixes and service packs or executing intelligent security practices on the IIS server as well as on your entire network. Without solid grounding in a well-designed security policy for your entire organization, no tool can provide you with adequate security.

You can download the URLScan tool from the Microsoft Web site at: www.microsoft.com/windows2000/downloads/recommended/urlscan/default.asp

About the author
James Michael Stewart is a researcher and writer for Lanwrights, Inc.

This was first published in May 2002

Dig Deeper



Find more PRO+ content and other member only offers, here.



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:



  • Virtual desktop security guide

    To secure virtual desktops, consider antivirus, certificates and network vulnerabilities. Just remember, VDI doesn't always ...

  • Guide to low-cost desktop virtualization

    In this guide, learn to virtualize desktops without spending more than you would when deploying PCs, and what VDI vendors are ...

  • VDI pilot project guide

    A VDI pilot project should start with a VDI project plan. Know what pitfalls to avoid and test product options to achieve a ...