?
Solved

Error in tree in MMC IIS

Posted on 2001-06-12
7
Medium Priority
?
477 Views
Last Modified: 2007-11-27
I have a system running Win2k server with two logical disks - c: and d:.

If I create a virtual directory under IIS on disk d: it shows up with a red error symbol in the tree in MMC. This happens for any directory. Virtual directories from drive c: don't do this.

However there is nothing wrong with the virtual directory, it works fantastic, I can see all the files in MMC, I can access the directory from my browser... just this rather annoying red Error symbol.

Any ideas?

Thanks,

Rafi
0
Comment
Question by:rafistern
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 7

Expert Comment

by:franka
ID: 6180416
any entries in the eventlog?
0
 
LVL 7

Accepted Solution

by:
franka earned 300 total points
ID: 6180432
It basically means that the anonymous user account will probably not have access to this directory. Is this possible? Can you check NTFS rights?

0
 
LVL 4

Author Comment

by:rafistern
ID: 6180445
Just checking the evnt log. Looks like there might be something there.

The IUSR can read the pages through the browser. Doesn't that mean that the anonymous user has access?
0
Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

 
LVL 4

Author Comment

by:rafistern
ID: 6180461
How are these:

==========================================

Event Type:     Warning
Event Source:     Ci
Event Category:     CI Service
Event ID:     4149
Date:          6/12/2001
Time:          12:08:38 PM
User:          N/A
Computer:     BM1INSRV
Description:
Read of USN log for NTFS volume d: failed with error code 0xC0000022.  Volume will remain offline until the Indexing Service (cisvc) is restarted.

==========================================

when restarting Indexing Service

and

==========================================
Event Type:     Error
Event Source:     Ci
Event Category:     CI Service
Event ID:     4118
Date:          6/12/2001
Time:          12:01:04 PM
User:          N/A
Computer:     BM1INSRV
Description:
A content scan could not be completed on d:\rafi\sites\kadisha\.

==========================================
0
 
LVL 7

Expert Comment

by:franka
ID: 6180517
that refers to the index service that is very likely not the reason for the red stop sign
0
 
LVL 4

Author Comment

by:rafistern
ID: 6180558
Yes I gathered that, but I thought maybe that it might give a hint.
0
 
LVL 4

Author Comment

by:rafistern
ID: 6180605
Solved the problem.

I added Everyone to d:\ with read/execute/list rights and all of a sudden voila!

You were right even though I had already guessed that and played with the rights 100 times before the miraculous recovery.

0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This is a fine trick which I've found useful many times, when you just don't want to accidentally run a batch script or the commands needs administrator rights.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month14 days, 23 hours left to enroll

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question