IIS 5.5 might be more secure, particularly with Service Pack 2. Or IIS 6.0 if it would work with XP, though I'm not sure on that one. Also, if you don't have the latest O/S patches, you aren't secure. I didn't look through all of the article, but it did have some good suggestions.
There is also the issue of some configuration things to look after. I'll just copy some things from a book published by the Navy and not available on the open market. No copyright violation but too big to post the whole volume...
1. Disable NetBIOS on the Web Server machine
2. Disable File/Print Sharing for Microsoft Networks
3. Remove the Sample Apps that are always distributed with an IIS install.
4. Look at
http://www.microsoft.com/technet/security/tools/chklist/iis5cl.asp abd
http://www.microsoft.com/technet/security/tools/chklist/iis5chk.asp
5. Remove unneeded script mappings
6. Watch out for older versions of MDAC. Do not use RDS without configuring it.
7. You probably should disable "parent path" ability.
8. Disable Directory Browsing.
9. Disable WebDAV
10. Setup logging, configure it, and secure it. DO NOT LOG TO THE DEFAULT LOG LOCATION that comes "out-of-the-box" for IIS.
11. Go through your list of trusted certificate authorities to see which ones you REALLY want to trust.
12. Carefully consider how you will allow authentication.
13. Beware of dynamic user group "Everyone" on the disk that holds your web site files. If possible, make this a separate partition or even a separate physical volume from your system disk. Every place that you have a permission for "Everyone" - replace it with a permission for dynamic user group "Authenticated Users."
14. Don't forget that NTFS permissions and IIS permissions interact. Sometimes their interaction can be your friend. Sometimes not.
15. On the system that is your web server, consider blocking network access to any of the command-line utilities.
16. If you have access to the Win2K Resource kit, consider applying IIS Lockdown tool and some of the high-web-security policy templates.
17. Work with your developers to be sure that the pages do input filtering for any text characters not prouctively used by the application.