{"id":7457,"date":"2014-06-19T03:59:14","date_gmt":"2014-06-19T03:59:14","guid":{"rendered":"https:\/\/unknownerror.org\/index.php\/2014\/06\/19\/trying-to-get-iis-running-in-vm-and-visual-studio-running-natively-with-files-on-native-file-system-collection-of-common-programming-errors\/"},"modified":"2014-06-19T03:59:14","modified_gmt":"2014-06-19T03:59:14","slug":"trying-to-get-iis-running-in-vm-and-visual-studio-running-natively-with-files-on-native-file-system-collection-of-common-programming-errors","status":"publish","type":"post","link":"https:\/\/unknownerror.org\/index.php\/2014\/06\/19\/trying-to-get-iis-running-in-vm-and-visual-studio-running-natively-with-files-on-native-file-system-collection-of-common-programming-errors\/","title":{"rendered":"Trying to get IIS running in VM and Visual Studio running natively, with files on native file system-Collection of common programming errors"},"content":{"rendered":"<p>One trick may be to disable the file-monitoring features of the development web server. Normally ASP.NET monitors for changes and restarts the application pool if something changes. There is a registry setting to disable this though. That may result in a more descriptive error further into the startup process.<\/p>\n<p>You can set the registry key FCNMode to 1 to disable monitoring:<\/p>\n<p>http:\/\/support.microsoft.com\/kb\/911272<\/p>\n<p>HKLM\\Software\\Microsoft\\ASP.NET\\FCNMode<\/p>\n<p>or here if running a 32-bit application pool on 64-bit Windows:<\/p>\n<p>HKLM\\SOFTWARE\\Wow6432Node\\Microsoft\\ASP.NET\\FCNMode<\/p>\n<p>You may want to run SysInternal&#8217;s Process Monitor to determine what files\/folders are being accessed that are resulting in the error. For example, it may be attempting to access C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files, and your application identity would need permissions to that folder.<\/p>\n<p>If it isn&#8217;t file system permissions, it may be due to the code access security (CAS) features of .NET. It probably doesn&#8217;t know what to make of the VMWare mapped resources. You may want to try entering an exception for the locations. If that doesn&#8217;t work, you may want to try using an SMB mapped drive to the network address of the host instead of using the VMWare networking.<\/p>\n<pre><code>CD \/D C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727  \ncaspol.exe -m -ag 1 -url \"file:\/\/\\\\vmware-host\\*\" FullTrust -exclusive on\ncaspol.exe -m -ag 1 -url \"file:\/\/L:\/TFSProjects\" FullTrust -exclusive on\ncaspol.exe -m -ag 1 -url \"http:\/\/localhost\/*\" FullTrust -exclusive on  \n\nCD \/D C:\\WINDOWS\\Microsoft.NET\\Framework64\\v2.0.50727 \ncaspol.exe -m -ag 1 -url \"file:\/\/\\\\vmware-host\\*\" FullTrust -exclusive on \ncaspol.exe -m -ag 1 -url \"file:\/\/L:\/TFSProjects\" FullTrust -exclusive on\ncaspol.exe -m -ag 1 -url \"http:\/\/localhost\/*\" FullTrust -exclusive on  \n\nCD \/D C:\\WINDOWS\\Microsoft.NET\\Framework\\v4.0.30319   \ncaspol.exe -m -ag 1 -url \"file:\/\/\\\\vmware-host\\*\" FullTrust -exclusive on\ncaspol.exe -m -ag 1 -url \"file:\/\/L:\/TFSProjects\" FullTrust -exclusive on\ncaspol.exe -m -ag 1 -url \"http:\/\/localhost\/*\" FullTrust -exclusive on  \n\nCD \/D C:\\WINDOWS\\Microsoft.NET\\Framework64\\v4.0.30319   \ncaspol.exe -m -ag 1 -url \"file:\/\/\\\\vmware-host\\*\" FullTrust -exclusive on\ncaspol.exe -m -ag 1 -url \"file:\/\/L:\/TFSProjects\" FullTrust -exclusive on\ncaspol.exe -m -ag 1 -url \"http:\/\/localhost\/*\" FullTrust -exclusive on  \n\n\nREM display the exceptions\ncaspol -lf \n<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>One trick may be to disable the file-monitoring features of the development web server. Normally ASP.NET monitors for changes and restarts the application pool if something changes. There is a registry setting to disable this though. That may result in a more descriptive error further into the startup process. You can set the registry key [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7457","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/posts\/7457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/comments?post=7457"}],"version-history":[{"count":0,"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/posts\/7457\/revisions"}],"wp:attachment":[{"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/media?parent=7457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/categories?post=7457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/tags?post=7457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}