Security Basics mailing list archives

Re: Error while applying iislockdown


From: <brian.hayes () mckennan org>
Date: 17 Sep 2004 14:42:34 -0000

In-Reply-To: <000601c3737f$3e4dc1f0$b401a8c0@rome>

Can you tell me what the solution is? You don't amnually backup the metabase when you runISS Lockdown, it runs by 
itself.


Received: (qmail 4019 invoked from network); 5 Sep 2003 18:46:03 -0000
Received: from outgoing3.securityfocus.com (205.206.231.27)
 by mail.securityfocus.com with SMTP; 5 Sep 2003 18:46:03 -0000
Received: from lists.securityfocus.com (lists.securityfocus.com [205.206.231.19])
      by outgoing3.securityfocus.com (Postfix) with QMQP
      id 90F88A354B; Fri,  5 Sep 2003 12:51:01 -0600 (MDT)
Mailing-List: contact security-basics-help () securityfocus com; run by ezmlm
Precedence: bulk
List-Id: <security-basics.list-id.securityfocus.com>
List-Post: <mailto:security-basics () securityfocus com>
List-Help: <mailto:security-basics-help () securityfocus com>
List-Unsubscribe: <mailto:security-basics-unsubscribe () securityfocus com>
List-Subscribe: <mailto:security-basics-subscribe () securityfocus com>
Delivered-To: mailing list security-basics () securityfocus com
Delivered-To: moderator for security-basics () securityfocus com
Received: (qmail 26420 invoked from network); 5 Sep 2003 01:27:16 -0000
Message-ID: <000601c3737f$3e4dc1f0$b401a8c0@rome>
Reply-To: "Gopinath" <gopinath_r () naturesoft net>
From: "Gopinath" <gopinath_r () naturesoft net>
To: "Ronish Mehta" <sf_mail_sbm () yahoo com>,
      <security-basics () securityfocus com>
References: <20030902061440.779.qmail () web20510 mail yahoo com>
Subject: Re: Error while applying iislockdown
Date: Fri, 5 Sep 2003 12:58:03 +0530
MIME-Version: 1.0
Content-Type: text/plain;
      charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000

Hi
The default location of the backup is the
%SystemRoot%\system32\inetsrv\MetaBack folder. If you want to save your
backup to another location, you can copy the file from this default location
to another location. Keep a copy in the default location to allow for an
easy restoration. Note that by default, c:\Winnt is the %SystemRoot% folder
in Windows 2000.

Note: First, you cannot restore the metabase backup to another installation
of Windows 2000. Although this would be convenient, this feature won't allow
you to clone one IIS configuration to another server in your Web farm. More
importantly, if you lose your entire server and end up reinstalling the
operating system, you'll be unable to recover your IIS configuration from
this backup. In other words, this backup isn't appropriate for disaster
recovery use. The metabase backup and restoration functionality is best used
for versioning purposes and to recover from the administrative mistakes that
continue to plague Webmasters whether the mistakes are attempted
optimizations that have the opposite affect or simple point-and-click
errors.

Warm regards
Gopinath

----- Original Message -----
From: "Ronish Mehta" <sf_mail_sbm () yahoo com>
To: <security-basics () securityfocus com>
Cc: "Gopinath" <gopinath_r () naturesoft net>
Sent: Tuesday, September 02, 2003 11:44 AM
Subject: Re: Error while applying iislockdown


IIS 5.0

--- Gopinath <gopinath_r () naturesoft net> wrote:
Which version of IIS you are using ?

Gopinath
----- Original Message -----
From: "Ronish Mehta" <sf_mail_sbm () yahoo com>
To: <security-basics () securityfocus com>
Sent: Friday, August 29, 2003 11:12 AM
Subject: Re: Error while applying iislockdown


Hi,
While appliying IIS Lockdown, on a Win2K server,
we
get the following error:
"Unable to backup IIS metabase"; can anyone
help...

Thanks


__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site
design software
http://sitebuilder.yahoo.com



--------------------------------------------------------------------------
-
Attend Black Hat Briefings & Training Federal,
September 29-30 (Training),
October 1-2 (Briefings) in Tysons Corner, VA; the
world's premier
technical IT security event.  Modeled after the
famous Black Hat event in
Las Vegas! 6 tracks, 12 training sessions, top
speakers and sponsors.
Symantec is the Diamond sponsor.  Early-bird
registration ends September
6.Visit us: www.blackhat.com


--------------------------------------------------------------------------
--





__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com

--------------------------------------------------------------------------
-
Attend Black Hat Briefings & Training Federal, September 29-30 (Training),
October 1-2 (Briefings) in Tysons Corner, VA; the world's premier
technical IT security event.  Modeled after the famous Black Hat event in
Las Vegas! 6 tracks, 12 training sessions, top speakers and sponsors.
Symantec is the Diamond sponsor.  Early-bird registration ends September
6.Visit us: www.blackhat.com
--------------------------------------------------------------------------
--




---------------------------------------------------------------------------
Attend Black Hat Briefings & Training Federal, September 29-30 (Training), 
October 1-2 (Briefings) in Tysons Corner, VA; the world's premier 
technical IT security event.  Modeled after the famous Black Hat event in 
Las Vegas! 6 tracks, 12 training sessions, top speakers and sponsors.  
Symantec is the Diamond sponsor.  Early-bird registration ends September 6.Visit us: www.blackhat.com
----------------------------------------------------------------------------



---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: