ISA PerfMon and Optimization

Posted on 2003-03-07
Medium Priority
Last Modified: 2013-11-16
I'm trying to find out what PerfMon counters are best for monitoring Microsoft ISA server.  The server doesn't load any counters by default when the ISA Server Monitoring Perfmon MMC is launched, and I'm beginning to wonder if there are any counters specific to ISA actually installed on this system.

What are the counter objects relating to ISA (if any)?

Which ones are best for determining if ISA is running at peak performance or if it has a bottleneck?

If the ISA specific counters are missing, how do I go about getting them back?  Which files are the counters located in?  Once I know the files I can use Lodctr to get them installed.

Question by:Bozford
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2

Expert Comment

ID: 8103087
The ISA Performance Monitor has six performance monitor objects:
Bandwidth Contol, Cache Performance, Firewall Service performance, H.232 Filter Performance, and Web Proxy Service Performance.
To manage Performance Monitor Counters:

1. Click Start|Programs|Microsoft ISA Server|ISA Server performance Monitor.
2. On the Performance Monitor toolbar, click the New Counter Set button,then select the type of view you want (chart, histogram, or report).
3. Click the New Counter button. The Add Counters window appears.
4. Click the Performance object drop-down menu and select the desired ISA Server performance object(Bandwidth Control, Cache Performance, etc.).
5. Next, select the desired counters by clicking the counter and clicking the Add button.When you're done adding all of the counters you want to use, click the Close button.
6. The counters you selected are now added to the window and are charted(or reported, depending on your selection).
7. You can save the data you are currently charting, you can right-click the chart and save it as HTML file. You can also save data to a Word document or by using Windows Management Instrumentation(WMI).

The Log files will be stored by default in C:\Perflogs
You'll know which file and location for your logs by:
1. Click Start|Programs|Microsoft ISA Server|ISA Performance Monitor.
2. In the left console pane, expand Performance Logs and Alerts and click New Log Settings. Enter a anme in the dialog box that appears and click OK.
3. The Log File Settings window appears with three tabs(General, Log Files & Schedule).
4. You do the rest.

Accepted Solution

JJ2 earned 600 total points
ID: 8109518
Forgot to include Packet Filter performance in monitoring performance object.

>"Which ones are best for determining if ISA is running at peak performance or if it has a bottleneck?"

The administrator has to consistently monitor the desired Objects based on their network environment. Until such time that a "baseline" will be established that'll serve as a basis of determining the peak performance and its bottleneck.

Author Comment

ID: 8146210
Forgot one part (The most important one in my situation):  What to do if the proper counters didn't get installed.  :(

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Forefront Threat Management Gateway 2010 or FTMG comes with some very neat troubleshooting tools built-in when trying to identify what is actually happening behind the scenes within the product when traffic is passing through its interfaces. To the …
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question