Every security solution requires some degree of debugging, and the goal of this chapter is to make it much easier to find a solution to your debugging issues.
The chapter is divided into four parts:
Tools and logs available to you
The art of reading a Windows 2000 logon event
The art of reading an Internet Information Services (IIS) log entry