Skip to main content

Tricks to maximize performance of IIS hosted Web Applications

Internet Information Services Server


IIS server is provided by Windows in its Operating Systems for Workstations and Server-side usages. This web server lets us host multiple websites with inline capacity to host multiple web applications in one single website. 

The run COMMAND shortcut is INETMGR. 

All these websites, when started for first time setup/configuration, automatically create an application pool for each of the website deployed.

Please note that an application pool is the overall process space a hosted web application runs in.

This application pool provides the complete local resource allocation for the hosted web application/web site it is assigned to.

So, to make the most of it, tricks are given below:


1. Every web application must be hosted separately. It must be assigned a separate application pool.

"As more than one application running in same application pool divides the resources between them making it insufficient for any of them working on full scale robustly."

2. Every website should also be assigned separate application pool for the same logic as trick mentioned above.

3. All the application pools should run or allow 32 bit applications if there are cross platoform integrations in the hosted application.

4. IIS logs can be in US timestamp format as well as local timezone. For this just change the logging format to IIS from W3C.

5. A hosted website can be made more secure in IIS by setting HTTP Response Headers as below:

Content Security Policy
Feature Policy
HTTP Strict Transport Security (HSTS)
Permissions Policy
X-Content Type Options
X-Frame-Options
X-XSS Protection
Cross Origin Resource Policy (CORP)
Access-Control-Allow-Methods

6. Setting default page for a web application or website helps load the start page without entering the complete page url. Just the application directory works fine.
For e.g. https://myapp.in/App1/Login.aspx
And https://myapp.in/App1 will redirect to the same page.



Note: If you need C# code for smooth application monitoring hosted at IIS remotely, punch in the same in comments section. 





Comments

Popular posts from this blog

Working with OAuth Tokens in .NET Framework 4.8

  Working with OAuth Tokens in .NET Framework 4.8 OAuth (Open Authorization) is a widely used protocol for token-based authentication and authorization. If you're working with .NET Framework 4.8 and need to integrate OAuth authentication, this guide will walk you through the process of obtaining and using an OAuth token to make secure API requests. Step 1: Understanding OAuth Flow OAuth 2.0 typically follows these steps: The client requests authorization from the OAuth provider. The user grants permission. The client receives an authorization code. The client exchanges the code for an access token. The client uses the token to access protected resources. Depending on your use case, you may be implementing: Authorization Code Flow (for web applications) Client Credentials Flow (for machine-to-machine communication) Step 2: Install Required Packages For handling HTTP requests, install Microsoft.AspNet.WebApi.Client via NuGet: powershell Copy Edit Install-Package Microsoft.AspNet.W...

Changing the Default SSH Port on Windows Server 2019: A Step-by-Step Guide

Changing the Default SSH Port on Windows Server 2019: A Step-by-Step Guide By default, SSH uses port 22 for all connections. However, for enhanced security or due to policy requirements, it may be necessary to change this default port. In this guide, we'll walk you through how to change the SSH port on Windows Server 2019 . Changing the default port not only reduces the chances of brute-force attacks but also minimizes exposure to potential vulnerabilities. Let's get started! Why Change the Default SSH Port? Changing the default SSH port can offer several advantages: Security : Automated scripts often target the default SSH port (22). Changing it can prevent many basic attacks. Compliance : Certain compliance regulations or internal policies may require the use of non-standard ports. Segregation : If multiple services are running on the same server, different ports can be used for easier management and separation. Prerequisites Before proceeding, ensure that you: Have administ...

Understanding SSL Certificate Extensions: PEM vs. CER vs. CRT

Understanding SSL Certificate Extensions: PEM vs. CER vs. CRT In the realm of SSL certificates, file extensions like PEM, CER, and CRT play crucial roles in how cryptographic information is stored and shared. While often used interchangeably, each extension carries its own conventions and encoding formats. In this blog post, we'll unravel the differences between PEM, CER, and CRT to shed light on their individual purposes. PEM (Privacy Enhanced Mail) Format: PEM is a versatile format widely employed for storing cryptographic objects. It utilizes base64-encoded ASCII, often adorned with headers like "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----." Extension: Files with the PEM extension are multipurpose, housing certificates, private keys, and other encoded data. Use Case: PEM's flexibility makes it suitable for a variety of cryptographic data, from certificates to private keys and certificate signing requests (CSRs). CER (Certificate) Format...