Sunday, June 5, 2011

Audit Policy in Windows 7 and 2008 R2

Introduced granular auditing in Windows Vista and a few years later we released Advanced Audit Policy Configuration. Legacy Windows audit policy didn’t go away, of course. To make things interesting, all of this can be configured through domain policy, local policy, multiple-local policy, per-user, or using command-line tools. Like most security policy that has evolved through 20 years of Windows, it’s a bit of a Frankenstein’s monster. Making sense of what settings are actually in place in Win7 and 2008 R2 can be a real pain in the neck. Today we’ll see if I can make it easier.
Fire good!
A Scenario
You commonly configure audit settings using the following:
  • Domain based group policy (via GPMC.MSC)
  • Local policy (via GPEDIT.MSC)
  • Directly (only advanced audit policy, via auditpol.exe)
But depending on how you set the policy, your reporting tools may be misleading you around effective settings. For instance, I have specified the following policies using the following techniques.
1. I have a legacy audit policy applying from domain policy that configures Object Access auditing:

2. I have advanced audit configuration applying from domain policy that sets AD changes, account lockouts, and logons:

3. I have advanced audit configuration applying from local policy for process startup and termination:

4. I have granular audit settings configured using auditpol.exe /set for file share access:
Pro tip: this is not awesome auditing technique, on a number of levels. :) Just for demo purposes, mmmkay?
Initial Results
Now I generate a resultant set of policy report. I am not using RSOP.MSC as it’s deprecated and often wrong and generally evil. I run GPRESULT /H foo.htm instead:


Looks pretty good so far. I can’t see my policy that I set through auditpol.exe though; that kinda sucks but whatevah.
So now I start generating some audit events for the areas I am tracking from my four audit points. Immediately I see some weirdness:
  • All the advanced audit configuration coming from “Local Group Policy” and “Advanced Audit DC Policy” is working great.

  • My event log should be flooded with Object Access events but there are zero. 
  • Accessing file shares doesn’t generate any audit events.
The lack of Object Access auditing is expected: as soon as you start applying Advanced Audit Configuration Policy, legacy policies will be completely ignored. The only way to get a Win7/R2 computer to start using legacy policy is to set the security policy “Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings” to DISABLED. That disables the use of the newer policy type.
Not seeing the File Share events makes sense too: after all, I created domain based and local policy to set all of this; they are just blowing away my local settings, right?
Yes and no.
First, I delete my link for the “Advanced audit DC policy” and run GPUPDATE /FORCE. Now I am only getting local policy settings for process creation and termination as expected. If I then re-run my auditpol /set /subcategory:”file share” /success:enable command and access a file share, I get an event. Yay team. Except after a while, this will stop working, because the local policy setting is going to reapply when the computer restarts or every 16 hours when security policy is reapplied arbitrarily.
Here’s where things get weird.
Unlike most security settings that directly edit registry keys as preferences, advanced audit policy stores all of its local security policy values in an audit.csv file located here:
%systemroot%\system32\grouppolicy\machine\microsoft\windows nt\audit\audit.csv
Which is then copied here:
%systemroot%\security\audit\audit.csv
But the domain-based policy settings are in an audit.csv in SYSVOL and that is never stored locally to the computer. So examining any of them is rather useless. Unfortunately for you, those audit.csv files are what RSOP data is returning, not the actual applied settings. And if you use legacy tools like SECEDIT.EXE /EXPORT it won’t even mention the advanced audit configuration at all – it was never updated to include those settings.
The Truth
All of this boils down to one lesson: you should not trust any of the Group Policy reporting tools when it comes to audit settings. There’s only one safe bet and it’s this command:
auditpol.exe /get /category:*

Only auditpol reads the actual super-top-secret-eyes-only-licensed-to-kill-shaken-not-stirred registry key that stores the current, effective set of auditing policy that LSASS.EXE consumes:
HKEY_Local_Machine\Security\Policy\PolAdtEv

If it’s not in that key, it’s not getting audited.
Before you get all excited and start plowing into this key, understand that this key is intended to be opaque and proprietary. We don’t really document it and you certainly cannot safely edit it with regedit. In fact, as an experiment I once renamed it in order to see if it would be automatically recreated using “default, out of box” settings. Instead, the computer refused to boot to a logon prompt anymore! I had to load that hive using regedit in WIN PE and name it back (Last Known Good Configuration boot does not apply to the Security hive). If you want to write your own version of auditpol you use the functionAuditQuerySystemPolicy (part of the gigantor Advapi32 library of Authorization functions; have fun with that goo and don’t call me about it, it’s grody).
As a side note - if you want a safe way to remove auditing settings you can easily clear that registry key by running auditpol /clear and removing policy. That puts you to “nothing”. If you want to restore to “out of the box” experience you would useauditpol /backup on a nice clean unadulterated repro computer that was installed from media and never joined to a domain. That gives you the “before”. Then if you ever want to reset a computer to OOB you auditpol /restore it.
Until next time.
Ned “Wait. Where are you going? I was going to make Espresso!” Pyle

Saturday, April 2, 2011

Installing Windows on an External Hard Drive


  • 1.Check that the size of the external hard drive meets the system requirements of the Windows operating system. Windows XP requires 1.5 gigabytes of free hard drive space. Windows Vista requires 20 gigabytes (for the Home Basic edition) or 50 gigabytes (for all other editions). The system requirements for older, outdated versions of the Windows operating system, such as Windows Me and Windows 98, can be found on the official Microsoft Windows Web site (link in the Resources section).

  • 2. Connect the external hard drive to the computer with which you plan to use the hard drive. Use the hard drive's original cables included by the drive's manufacturer. It does not matter what connectivity standard you use. Windows will automatically detect the external hard drive.

  • 3.Click the Start menu in the lower left-hand corner of the PC screen and select My Computer.

  • 4.Right-click the icon for the external hard drive. Click Format from the pop-up menu. Format the external hard drive in the NTSF format.

  • 5.Insert the original Windows installation disk into your computer's CD-ROM drive. Close the Installation Wizard when it appears on the screen.

  • 6.Return to the My Computer window from Step 3. Write down the drive letters assigned to the CD-ROM drive and the drive of your external hard drive. For the sake of this article, we will use the example of D:\\\\ being the external hard drive and E:\\\\ being the CD-ROM drive. These are typically the letters assigned to CD-ROM and external drives in the Windows operating system.

  • 7.Click the Start menu button and select Run.

  • 8.Type \"E:\\I386\\winnt32.exe /syspart:D: /tempdrive:D: /makelocalsource /noreboot\" (without quotation marks) and click OK. This launches the Windows installer file on the Windows installation disk in drive E:\\\\ and commands it to install on the D:\\\\ drive (your external hard drive). The Windows Installer Wizard screen will appear.

  • 9.Select the Full Install option in the Windows Installer Wizard. You will then be guided through the Windows installation disk. Follow the on-screen prompts to complete the installation. Depending on the speed of your computer's processor, this may take several hours. Be prepared to enter important information, such as your Windows registration key to register your copy of the Windows operating system. Do not close the installation window until the installation process is complete.

  • 10.Shut down the computer and disconnect the external hard drive. You can now use the external hard drive to boot up another computer using the installed copy of the Windows operating system.


  • Thursday, February 17, 2011

    How to Find out Applications consuming more CPU and RAM on Windows 7

    Geeks are always interested in knowing performance of computer , discovering applications eating up RAM catch the application causing problems. and consuming CPU usage. Here I share a real time process/thread activity tool so that we can
    Windows 7 integrates number of tools to keep watch on process activities but why not use an universal standalone tool with which you can find out Applications consuming more CPU and RAM Memory on Windows.
    With free program called “Process Monitor” from Microsoft (SysInternals) which doesn’t require installation. Very easy to use and monitor status of PC and find out resource sucking process and limit them manually.
    Application consuming CPU RAM
    1. Go to menu File and uncheck the item Capture events You can pause the monitoring process by Process Monitor.
    2. Click on the button Clear toolbar (the sheet with the eraser) to erase all information previously recorded by Process Monitor;
    3. Go to menu Options> Events Profiling, Put the check on the items Generate thread profiling events and Every 100 milliseconds, And click OK to configure the program so that it captures the execution of each process in the log;
    4. Go to menu File and put the tick on the item Capture events to restart the monitoring process by Process Monitor;
    5. At the end of follow-up, ie after using the programs referred to means test the appetite for resources, back in the main Process Monitor, go to the menu File and uncheck the item Capture events to stop the monitoring process;
    6. Go to menu Tools> Process Activity Summary to view the list of registered processes by Process Monitor on CPU and RAM consumption.
    Application consuming CPU RAM
    Sort processes according to RAM usage now
    Application consuming CPU RAM

    Saturday, February 12, 2011

    How to Check if Your Gmail Account Has Been Hacked


    Step 1: Find the ‘Last Account Activity’ Section Your Inbox

     details How to Check if Your Gmail Account Has Been Hacked
    At the bottom of your Gmail inbox there is a ‘Last Account Activity’ section.  Click on ‘details’ to launch the full blown monitor.

    Step 2: See who has accessed your Gmail account recently

    ipaddress How to Check if Your Gmail Account Has Been Hacked
    Next, what you’ll see is a table of the most recent activity from your Gmail account.  It shows you
    • How it was accessed (Browser/mobile etc)
    • Where exactly the IP address is (So you can do some further digging)
    • When it was accessed

    Step 3: Understand the IP addresses – Has your Gmail really been hacked?

    domaintools How to Check if Your Gmail Account Has Been Hacked
    If you see IP addresses from different countries, don’t be too quick to panic.  If you use any 3rd party services which hook-up to your Gmail account, they will almost certainly show up in your activity log.  To do you own investigation, you can use DomainTools to identify the IP address. This will help you differentiate normal activity and your Gmail account being hacked.

    Step 4: Understand the alerts – Google’s way of highlighting suspicious activity

    alerts How to Check if Your Gmail Account Has Been Hacked
    Google will also do it’s fair share of monitoring, and will also alert you if it sees suspicious activity both in your inbox, as well as your recent activity log.  When this happens, and the IP addresses look suspicious, it is advisable to play it safe, assume your Gmail account has been hacked, and change your passwords immediately. 

    Step 5: Sign Out All Other Sessions – If you forgot to sign out on a public computer

    signout How to Check if Your Gmail Account Has Been Hacked
    If you are worried you did not not sign out of a public computer, you can ‘sign out all other sessions’.  This won’t fix any hacked Gmail accounts, but it will resolve any careless mistakes. This is also useful if you happen to lose your mobile phone and you want to ensure your email is not read by others.

    Step 6: What to do if your Gmail account has really been hacked

    The first thing you do is change both your password and security question right away.  Then make sure your new choices are very secure.  Google themselves have some really good tips .  For example in the case of security questions:
    • Choose a question only you know the answer to – make sure the question isn’t associated with your password.
    • Pick a question that can’t be answered through research (for example, avoid your mother’s maiden name, your birth date, your first or last name, your social security number, your phone number, your pet’s name, etc.).
    • Make sure your answer is memorable, but not easy to guess. Use an answer that is a complete sentence for even more security.
    So there you have it.  A step-by-step guide on fully understanding Gmail’s account activity log, and how to check if your Gmail account has been hacked :)

    Friday, February 11, 2011

    Splashtop OS: Quick Boot Operating system for Web Surfing

    Splashtop OS is an operating system which boots instantly, specially developed for the OEM market and for accessing Web services in no time and lets you enter online world without entering Windows.
    There are few manufacturers who provide this feature inbuilt into their products but now it is no more restricted to OEMs but even you can try it on your machine for free.
    Splashtop OS is a light weight operating system which boots quickly and lets you connect to Internet quickly. Its simple and light weight because only thing it carries is web browser just like Google Chrome OS which is required to connect to Internet.
    Splashtop OS Review

    For whom is it?

    It is suitable for netbooks or travellers who just want to check with emails or surf web instantly. Not limited to these but it is suitable for cyber cafes, friend or relative who understands little about  Computers.

    Installation is quite easy: You need Windows > Download a 2 MB Online installer which downloads complete OS (nearly 220 MB) and after complete installation, restart to boot Splashtop.

    The full boot takes about 20 seconds, if you count the time from when the computer’s power button was pressed. If we consider just the operating system, the boot is done in about eight seconds.
    The trick behind quick loading is to launch a custom Linux kernel that loads only the essentials so that the user can navigate through the Chromium web browser.
    Use of the Splashtop OS is very simple. Despite that the base is Linux, you will have access to a full graphical environment like KDE. One of the few programs which can interact with the web browser open full screen by default, configured to use Bing search engine and Flash Player 10 installed.
    For downloads, storage and new themes for the browser, USB flash memory will be needed, since the user has limited permissions to access the disk. When connected, the memory is automatically recognized. The system has a very simple file manager so that the user can view, copy, move or delete files on the USB disk.

    Blogsolute Verdict about Splashtop OS

    Despite being still in beta, Splashtop OS is an operating system stable and well developed, which did not show any fault during our tests. Although it is a bit limited, Splashtop OS seems to be a good choice for netbooks and other similar devices, as a quick alternative to surf the internet.
    The startup time is impressive: after pressing the Power button takes 20 seconds for the system is ready for use.
    Integration with Bing may be a problem for some users, but it is possible to configure Chromium Google or other search engine.
    The configuration tools of Splashtop OS is easy to use and self explanatory, taking only the essentials to eliminate distractions or confusion by the user. The downside is the import feature of Mozilla Firefox bookmarks, did not work during our tests.

    Thursday, January 13, 2011

    Automatically Backup Files & Folders to USB Drives

    If you are storing lot of important data on your system then loosing this data is a big set back. To prevent this we have to backup these files regularly. But there are times when we forget to perform these tasks and as a result we may have to suffer great loss.
    If you constantly keep forget to backup your data, Drive back up is a small utility that can be of great help. Similar app we covered was to copy USB drive silently.


    Drive Backup is a freeware windows application that can automate backup tasks once configured. Using this application is very easy. First thing that you have to do is to setup the usb drive you want to use as backup drive.


    You can also use this application to backup usb drives to your hard disk. This task can be switched from the 2 modes present in the application.


    Once the above things are set, you can select files and folders to backup. Files and folders added to the backup drive are processed instantly at background.

    Tuesday, January 4, 2011

    How to Unlock Protected PDF – Select, Edit, Print in Best Ways

    The standard PDF security allows passwords at two levels.
    ‘user password’ – password for opening the pdf file.
    ‘owner password’ – for restricting printing; copying text, decrypting graphics, adding or modifying text notes, fields
    There are times, when the owner forgets or have lost the actual password. In these cases, where has valid legal reason, follow the below methods. Please respect copyright laws and stay away from legal issues by unlocking unauthorized files.
    Commercial Solution : Advanced PDF Password Recovery from ElcomSoft and PDF Password Remover from Very PDF are best commercial products. But, we are here to talk about free ways.
    PDFCrack is a GNU/Linux open source (GPL) PDF password cracker for recovering owner and user passwords. PDFCrack is command line driven tool. PDFCrack version 0.8 is the latest version that has been ported to Win32 platform, and has been tested to work PDF version 1.6 from Adobe Acrobat version 7.0 with 128-bit AES encryption support.
    - Download Linux source version.
    - Download Windows pdfcrack-0.8-win32.zip.

    If you are just looking to bypass ‘owner password’ for printing. Below are the various working ways. 

    Method 1: With Ghostscript and GSView.
    • Download and install Ghostscript, an interpreter for the PostScript language and for PDF.
    • Download and install GSView, a graphical interface for Ghostscript.
    • Run ‘Start -> All Programs -> Ghostgum -> GSView’ to open and print/copy any security locked PDF files.
    • You can also save an unprotected version of the file. In GSView click "File -> Convert -> OK" and save it under a new name (unprotected.pdf).

    Method 2.a : Using Online Service FreeMyPDF to Remove Restrictionsfreemypdf.com interface
    FreeMyPDF is a online servive that lets you strip passwords and other restrictions from the file. Go to http://freemypdf.com/ and browse to upload the file you want to fix. It should be noted however that the process only works for files you are able to view—files which you need a password to even view can’t be unprotected by FreeMyPDF.


    Method 2.b : Using Online Service Ensode.net/pdf.jsf
    • Goto http://www.ensode.net/pdf-crack.jsf 
    • Accept the terms and upload the protected file and Submit.
    • A new window will open up and prompt to save pdf-crack.jsf
    • Rename the file from jsf to pdf (pdf-crack.pdf)
    • Now you can open the file to print or anything
    unlock-pdf


    Method 3 : Use of Screen grabber software.
    This method involves capturing the document as a picture, which can later be printed. Free Screen capturing software tool like Snipping Tool ( Vista free Screen Capture Utility) or SnagIt , which support auto-scroll to capture multiple pages of the document automatically. Also try Free Bug Shooting, Gadwin PrintScreen 4.3


    Method 4: Freeware PDF Unlocker
    Freeware PDF Unlocker allowing users to remove password and restrictions on any PDF file that you can read. The utility is very simple to use, simply drag and drop the file to remove restrictions. You do not need to know the "owner" password for this to work.  Download Freeware PDF Unlocker


    Method 5: pdfFactory and Zan image printer
    Download pdfFactory. Print to pdffactory. When the print preview comes up, save as pdf.
    Otherway, Go to http://www.zan1011.com/ and download the Zan image printer. This is an opensource driver. In the config, choose printer redirect and then hook off your prefered pdf writer. It even works with adobe writer. Your result is a “graphical” pdf file with no restrictions and you can run OCR if necessary. In some cases though Adobe Acrobat Reader might refuse to print to MDI or PS printer, saying “The printer is not allowed for secure printing. Do you want to change your choice ?”. 
    Printer port redirection tool such as RedMon can help.

     Method 6: PDFTools 1.3   Freeware


    Download   PDFTools      install and use fully free...


    Enjoy...

    Useful tools and add-ons for IIS troubleshooting and IIS7


    Source:→ Microsoft

    Understanding HTTP Error Messages

    HTTP error messages are related to the HTTP status codes which are included in the response headers when pages are requested from the Web server. HTTP status codes are three digit numbers.
    HTTP status codes are categorized into the following categories:
    • Informational (1xx): This category is used for testing, and is not used for production Web servers.
    • Successful (2xx): Indicates that requests were successfully received.
    • Redirection (3xx): Indicates that the client needs to perform additional steps for his/her request to be serviced.
    • Client Error (4xx): Indicates an error at the client.
    • Server Error (5xx): Indicates an error at the server.
    Understanding HTTP error messages and their associated status codes is important when you need to troubleshoot IIS. A few common errors on the client side (4xx error) and server side (5xx error) are listed below:
    • 400 Bad Request; the server cannot service the request, usually because of an incorrect URL.
    • 401 Unauthorized; the users credentials were not accepted by the authorization process.
    • 403 Forbidden; the request could not be serviced for a number of reasons, even though the user was authenticated.
    • 404 Not Found; the server cannot locate the requested file.troubleshooting iis Troubleshooting IIS
    • 405 Method Not Allowed; the client incorrectly issues a HTTP GET request when a HTTP POST request should have been issued.
    • 406 Not Acceptable; the requested file is not supported by the client.
    • 407 Proxy Authentication Required; the client has to authenticate with the proxy server before its request can be serviced.
    • 410 Gone; the server no longer has the requested file.
    • 500 Internal Server Error; indicates a typical server side error.
    • 501 Not Implemented; the server does not support the HTTP method requested by the client.
    • 502 Bad Gateway; an invalid response was received by the upstream server for which this server is a gateway.
    • 503 Service Unavailable; the server does not support the service requested by the client.
    From the above, you can see that a few of the error codes are quite vague in describing the actual issue. For this reason, a few HTTP error messages have substatus codes to provide more information on the current errors. The substatus codes associated with the various HTTP error messages in IIS 6 are:
    • The substatus codes for the 401 Unauthorized status code are:
      • 1; logon failed
      • 2; logon failed because of the server configuration
      • 3; logon failed because of the ACL on resource
      • 4; logon failed due to filter
      • 5; logon failed due to ISAPI/CGI application
      • 7; logon failed due to URL Authorization policy
    • The substatus codes for the 403 Forbidden status code are:
      • 1; Execute access denied
      • 2; Read access denied
      • 3; Write access denied
      • 4; requires SSL
      • 5; requires SSL 128-bit
      • 6; IP address denied
      • 7; requires client certificate
      • 8; site access rejected
      • 9; users too much
      • 10; invalid configuration
      • 11; password modified
      • 12; mapper access rejected
      • 13; client certificate revoked
      • 14; directory listing rejected
      • 15; client Access License exceeded
      • 16; client certificate not trusted
      • 17; client certificate either not valid yet, or expired
      • 18; request cannot be serviced by particular application pool
      • 19; CGI access rejected
      • 20; Passport failed
    • The substatus codes for the 404 Not Found status code are:
      • 2; denied by Lockdown Policy
      • 3; denied by MIME Map Policy
    • The substatus codes for the 500 Internal Serve Error status code are:
      • 12; application restarting
      • 13; server occupied
      • 15; direct requests forbidden for GLOBAL.ASA
      • 16; UNC access error
      • 17; URL Authorization store not located
      • 18; URL Authorization store cannot be accessed/opened
      • 19; bad file in metabase
      • 100; ASP application error
    By default, IIS returns the following default HTTP errors:
    • 403; 14 Forbidden – directory listing rejected
    • 500 Internal Server Error
    • 500; 100 Internal Server Error – ASP error
    • 501 Not Implemented
    • 502 Bad Gateway

    Custom HTTP Error Messages

    Besides for the default HTTP error messages, IIS returns custom error messages. IIS returns custom error messages for all the other HTTP error messages, other than the default HTTP error messages listed previously. Custom error messages provide more information on the error condition than what the default messages provide, and can be customized. The custom error messages also include additional troubleshooting tips, which the default HTTP error messages do not provide. When custom error messages are enabled, IIS logs the error in the web logs for the site at the same time that it sends the HTTP error message to the client.
    You can however configure IIS to return a default message over a custom error message for a particular error, or you can configure IIS to return only default error messages for all errors.
    The details and troubleshooting tips associated with custom HTTP error messages are discussed and condensed in the following section:
    • The Page Cannot Be Displayed: The page which you are looking for is currently unavailable.
      Please try the following:
      • Click the Refresh button.
      • Click the Back button to attempt a different link.
      • Ensure that the website page address is spelt correctly.
      • Verify the network connection settings which are being used. To do this, click the Tools menu, click Internet Options, and then click the Connections tab. Click Settings. The settings detailed for the connections must correspond to the settings which were provided by the ISP or LAN administrator.
      • To enable Windows to automatically detect your network connection settings, click Detect Network Settings.
      • Sites may require 128-bit SSL connection security. Use Help | About Internet Explorer to verify that the correct connection security is supported, and can be utilized.
      • Verify that your existing Security settings can support the required connection security by clicking the Tools menu, clicking Internet Options, and clicking the Advanced tab. Verify the settings for SSL 2.0, SSL 3.0, TLS 1.0, and PCT 1.0.
      Additional troubleshooting tips:
      • The client has incorrectly spelt the domain name of the website in the requested URL.
      • The port number of the website has since changed from its standard setting of port 80 to a different port number.
      • The website may have been stopped or paused by the administrator.
    • 400 Bad Request: The page could be temporarily unavailable, could have been removed, could have undergone a name change, or could have its content expired.
      Please try the following:
      • Ensure that the website address is spelt correctly.
      • Click the Back button to attempt a different link to access the same content.
      • Contact an administrator to inform him/her that the link is incorrectly formatted.
      Additional troubleshooting tips:
      • The client is normally the cause of this error condition. Typical causes are the utilization of spaces in the URL, or a syntax error in the URL.
      • The Default Web Site could have had its IP address changed from All Unassigned to an IP address which is not specified on IP Settings tab of the Advanced TCP/IP properties window.
    • 401 You Are Not Authorized to View This Page: The credentials which were provided do not include permission to access the page or directory.
      Please try the following:
      • Click the Refresh button and attempt to access the page/directory by providing different credentials.
      • Contact an administrator to inform him/her that you should be allowed to access the page/directory.
      Additional troubleshooting tips:
      • The provided credentials do not exist for the user.
      • A mapping failure occurred between the .NET Passports and the user accounts stored in Active Directory.
    • 401.2 You Are Not Authorized to View This Page: The credentials which were provided do not include permission to access the page or directory because the Web browser is sending a WWW-Authenticate header field which is not supported by the Web server.
      Please try the following:
      • Click the Refresh button and attempt to access the page/directory by providing different credentials.
      • Contact an administrator to inform him/her that you should be allowed to access the page/directory.
      Additional troubleshooting tips:
      • The site contains no configured authentication methods.
      • The incorrect credentials are being used to access a remote virtual directory.
    • 401.3 You Are Not Authorized to View This Page: The credentials which were provided cannot be used to access the page or directory because of the ACL set on the resource on the Web server.
      Please try the following:
      • Click the Refresh button and attempt to access the page/directory by providing different credentials.
      • Contact an administrator to inform him/her that you should be allowed to access the page/directory.
      Additional troubleshooting tips:
      • NTFS permissions are incorrectly configured for the requested file.
    • 401.4 You Are Not Authorized to View This Page: The credentials which were provided cannot be used to access the requested page or directory because user authentication failed. This is due to a filter implemented on the Web server which authenticates user access, and authentication has failed.
      Please try the following:
      • Click the Refresh button and attempt to access the page/directory by providing different credentials.
      • Contact an administrator to inform him/her that you should be allowed to access the page/directory.
    • 401.5 You Are Not Authorized to View This Page: The credentials which were provided cannot be used to access the requested page or directory because authentication failed due to an ISAPI application or a CGI application.
      Please try the following:
      • Click the Refresh button and attempt to access the page/directory by providing different credentials.
      • Contact an administrator to inform him/her that you should be allowed to access the page/directory.
    • 401.6 You Are Not Authorized to View This Page: The credentials which were provided cannot be used to access the requested page or directory because the authorization scope associated with the URL could not be located on the Web server.
      Please try the following:
      • Click the Refresh button and attempt to access the page/directory by providing different credentials.
      • Contact an administrator to inform him/her that you should be allowed to access the page/directory.
    • 401.7 You Are Not Authorized to View This Page: The credentials which were provided cannot be used to access the requested page or directory because of the URL Authorization policy configured for the Web server.
      Please try the following:
      • Click the Refresh button and attempt to access the page/directory by providing different credential.
      • Contact an administrator to inform him/her that you should be allowed to access the page/directory.
    • 403 You Are Not Authorized to View This Page: The credentials which were provided cannot be used to access the requested page or directory.
      Please try the following:
      • Click the Refresh button and attempt to access the page/directory by providing different credentials.
      • Contact an administrator to inform him/her that you should be allowed to access the page/directory.
    • 403.1 The Page Cannot Be Displayed: An executable program (CGI, ISAPI or some other program) was executed from a directory from which it could not be executed.
      Please try the following:
      • Contact an administrator to determine whether or not you should be allowed to execute programs from the directory.
      Additional troubleshooting tips:
      • Open the Home Directory tab of the website to check what execute permissions has been configured. For CGI and ISAPI applications, check that Script and Executable permissions have been configured.
    • 403.2 The Page Cannot Be Displayed: The page attempting to be accessed cannot be displayed. This is normally due to the directory being configured to allow Script and Execute permissions only.
      Please try the following:
      • Contact an administrator to determine whether Read permission should be allowed.
      Additional troubleshooting tips:
      • Open the Home Directory tab of the website to check whether the Read permission has been configured.
    • 403.3 The Page Cannot Be Saved: The page cannot be saved to the website because Write access is not allowed.
      Please try the following:
      • Contact an administrator to determine whether Write permission should be allowed for the directory.
      Additional troubleshooting tips:
      • For publishing content to IIS using either WebDAV or FrontPage, verify that the correct permission has been configured for the website.
      • For FTP sites, verify that the Write permission is enabled.
    • 403.4 The Page Must Be Viewed Over A Secure Channel: The page requires a Secure Sockets Layer (SSL) connection.
      Please try the following:
      • Enter https:// at the start of the address you want to navigate to.
    • 403.5 The Page Must Be Viewed With a High-Security Web Browser: To access the resource, your web browser needs to support 128-bit Secure Sockets Layer (SSL) encryption.
      Please try the following:
      • Upgrade the web browser to support 128-bit SSL encryption.
      • Contact an administrator to inform him/her that you should be allowed to access the page/directory.
    • 403.6 You Are Not Authorized to View This Page: The website has a predefined list of denied IP addresses, and the IP address being utilized appears on that list.
      Please try the following:
      • Contact an administrator to inform him/her that you should be allowed to access the page/directory.
      Additional troubleshooting tips:
      • Open the Directory Security tab of the website, and check whether the IP address appears on the IP Address and Domain Name Restrictions list.
    • 403.7 The Page Requires a Client Certificate: To access the page, you need a web browser to have a Secure Sockets Layer (SSL) client certificate which the particular Web server accepts.
      Please try the following:
      • Contact an administrator to inform him/her that you should be allowed to access the page/directory.
      • Contact an administrator to obtain a client certificate.
      • If you have a client certificate (valid) verify that is installed correctly.
    • 403.8 You Are Not Authorized to View This Page The Web server has a predefined list of denied DNS names, and the DNS name being utilized appears on that list.
      Please try the following:
      • Contact an administrator to inform him/her that you should be allowed to access the page/directory.
      Additional troubleshooting tips:
      • Open the Directory Security tab of the website, and check whether the DNS domain name of the client is disallowed.
    • 403.9 The Page Cannot Be Displayed: The Web server is currently too occupied to service the request.
      Please try the following:
      • Click the Refresh button
      Additional troubleshooting tips:
      • Verify whether the Connection Limit for the Web server has been surpassed.
    • 403.10 You Are Not Authorized to View This Page: This directory does not allow executable programs to be executed.
      Please try the following:
      • Contact an administrator to determine whether or not the directory should be configured to allow execute access.
    • 403.11 You Are Not Authorized To View This Page: The credentials provided to access the page/directory does not have the necessary permissions.
      Please try the following:
      • Click the Refresh button and attempt to access the page/directory by providing different credentials.
      • Contact an administrator to inform him/her that you should be allowed to view the page/directory.
    • 403.12 The Requested Page Requires A Valid SSL Client Certificate: The account associated with the client certificate on the Web server has not been allowed access to the site.
      Please try the following:
      • Contact an administrator to determine what the client certificate permissions are.
      • If you have a client certificate (valid) verify that is installed correctly.
      • Change the client certificate, click the Refresh button.
    • 403.13 The Page Requires A Valid SSL Client Certificate: The client certificate which was used has been revoked.
      Please try the following:
      • Contact an administrator to determine what the client certificate permissions are.
      • Contact an administrator to obtain a client certificate.
    • 403.14 Directory Listing Is Denied: A directory listing of this directory's content is not configured on the Web server.
      Please try the following:
      • Contact an administrator to determine whether a directory listing should be allowed.
      Additional troubleshooting tips:
      • Verify whether the Directory Browsing setting, and the Read permission has been enabled on the Home Directory tab for the site.
    • 403.15 The Page Cannot Be Displayed: The Web server has surpassed the configured Client Access License limit.
      Please try the following:
      • Click the Refresh button.
    • 403.16 The Page Requires A Valid SSL Client Certificate: The current client certificate is invalid/untrusted.
      Please try the following:
      • Contact an administrator to determine what the client certificate permissions are.
      • Verify that your existing valid client certificate is installed correctly.
      • Contact an administrator to obtain a client certificate.
    • 403.17 The Page Requires A Valid SSL Client Certificate: The current client certificate is invalid or has expired. A SSL client certificate is used to verify access to this particular resource.
      Please try the following:
      • Contact an administrator to determine what the client certificate permissions are.
      • Verify that your existing valid client certificate is installed correctly.
      • Change the client certificate, click Refresh.
    • 403.18 Cannot Execute Request from the Current Application Pool: The request could not be executed from the Current Application Pool specified for the particular resource.
      Please try the following:
      • Contact an administrator to inform him/her that you should be allowed to view the page/directory.
    • 403.19 Cannot Execute CGI Applications in the Current Application Pool on the Web Server: CGI Applications could not be executed from the Current Application Pool because the user has insufficient permissions.
      Please try the following:
      • Contact an administrator to inform him/her that you should be allowed to execute CGI applications.
    • 403.20 Passport Login Failed: An error was received from the Passport logon server.
      Please try the following:
      • Contact an administrator to inform him/her that you should be allowed to view the page/directory.
      • Click the Refresh button.
    • 404 The Page Cannot Be Found: The page was either renamed, removed, or is currently unavailable.
      Please try the following:
      • Ensure that the website address is correctly spelt and formatted.
      • Click the Back button to attempt a different link to access the same page.
      • Contact an administrator to inform him/her that the link is incorrectly formatted.
    • 404.1 The Website Cannot Be Found: For this site, an IP address is specified to disallow requests which detail a port number.
      Please try the following:
      • Ensure that the website address is correctly spelt and formatted.
      • Click the Back button to attempt a different link to access the same page.
      • Contact an administrator to inform him/her that the link is incorrectly formatted.
      Additional troubleshooting tips:
      • The client is probably requesting a URL for an IP address that is not used by IIS.
    • 404.2 The Page Cannot Be Found: The web service extensions specified for the Web server is preventing the request from being serviced.
      Please try the following:
      • Contact an administrator to inform him/her that the required web service extension is not configured for the site.
      Additional troubleshooting tips:
      • The required web service extension for the ASP.NET, ASP, ISAPI, or CGI application has not been configured.
      • An application extension is not mapped in IIS.
      • The user account under which the application (CGI) executes has the incorrect permissions.
    • 404.3 The Page Cannot Be Found: The Multipurpose Internet Mail Extensions (MIME) map policy specified for the Web server is preventing the request from being serviced.
      Please try the following:
      • Contact an administrator to inform him/her that the required file extensions have not been enabled via the MIME map policy.
      Additional troubleshooting tips:
      • The request is for a static file that's filename extension is not specified in the MIME map for the Web server or website.
    • 405 The Page Cannot Be Displayed: An invalid method, such as a HTTP verb, was used in the request for the page.
      Please try the following:
      • Ensure that the website address is correctly spelt and formatted.
      • Contact an administrator to inform him/her that the request should be allowed.
    • 406 The Resource Cannot Be Displayed: The requested page has a filename extension that is not supported by the browser being used.
      Please try the following:
      • Modify the MIME/security settings of the browser to support the requested page's filename extension.
    • 407 Proxy Authentication Required: To view the requested page, authentication has to occur through a proxy server.
      Please try the following:
      • Contact the administrator if you should be allowed to view the page/directory.
      • Retry logging on to the proxy server.
    • 410 The Page Does Not Exist: The requested page has since been removed/deleted.
      Please try the following:
      • Find additional links to the information which you want to view.
    • 412 The Page Cannot Be Displayed: The request could not be serviced because of preconditions existing in the request header which are preventing the particular request method.
      Please try the following:
      • Find additional links to the information which you want to view.
      • Delete any cached items and click Refresh.
    • 414 The Page Cannot Be Displayed: The requested URL address length is too long.
      Please try the following:
      • Ensure that the website address is correctly spelt and formatted.
      • Contact the administrator to inform him/her of the URL address error.
    • 415 The Page Cannot Be Returned: The requested file has a format which the Web server cannot download.
      Please try the following:
      • Contact the administrator to inform him/her of the error for the requested file.
    • 500 The Page Cannot Be Displayed: The requested page has a problematic condition which is preventing the request from being serviced.
      Please try the following:
      • Contact the administrator to inform him/her of the URL address error condition.
    • 500.11 The Page Cannot Be Displayed: The particular website is in the process of shutting down.
      Please try the following:
      • Click the Refresh button.
      • Contact the administrator to inform him/her of the URL address error condition if you continuously cannot access the website.
    • 500.12 The Page Cannot Be Displayed: The particular website is in the process of restarting.
      Please try the following:
      • Click the Refresh button.
      • Contact the administrator to inform him/her of the URL address error condition if you continuously cannot access the website.
    • 500.13 The Page Cannot Be Displayed: The particular website is too busy to service the request