IIS 403 Error — Forbidden Access Denied

WebServerErrors IIS Reconnaissance / Access Violation

What This Means

Troubleshoot IIS HTTP 403 Forbidden errors. Detect directory listing exposure, IP restriction bypasses, and unauthorized resource access targeting your web server.

Example Log

2026-03-08 15:10:44 W3SVC1 WEB01 10.0.1.50 GET /secret/config.xml - 443 - 203.0.113.55 python-requests/2.28.0 - 403 14 5 312

Indicators of Suspicious Activity

How to Investigate

  1. Group 403 errors by client IP and URI to identify scanning patterns
  2. Check the 403 sub-status code for the specific denial reason
  3. Review if any 403-targeted paths contain sensitive data that should be further restricted
  4. Correlate with 200 responses from the same IP to see what they successfully accessed
  5. Verify that directory browsing is disabled on all IIS sites
  6. Check IP restriction rules for misconfigurations

Recommended Mitigations

Scan This Log Instantly

Paste a suspicious log line below and get an instant AI-powered security assessment.

0 / 2000

Need a Full Investigation?

Scan entire log files, detect attack patterns, reconstruct timelines, and generate a full investigation report.

Run Smart Scan

Related Log Types

Related Attack Patterns

Frequently Asked Questions

What causes IIS 403 errors?
IIS returns 403 when the server understood the request but refuses to authorize it. Common causes include disabled directory browsing, IP restrictions, SSL requirements, request filtering rules, and NTFS permission denials.
What do IIS 403 sub-status codes mean?
Key sub-status codes: 403.1 (execute access forbidden), 403.4 (SSL required), 403.6 (IP address rejected), 403.14 (directory listing denied), 403.16 (client certificate untrusted).
How do I block vulnerability scanners in IIS?
Use Request Filtering to deny suspicious User-Agent strings, block requests for non-existent file extensions, and implement rate limiting via a WAF or IIS module like Dynamic IP Restrictions.