Solved

ISA Server - Create custom report jobs

Posted on 2004-08-31
2
700 Views
Last Modified: 2013-11-16
Hello,

we're running ISA Server 2000 and I'm trying to figure out how to run a report job based on a specific user rather than overall usage.  Can anyone help?

0
Comment
Question by:caw01
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 2

Expert Comment

by:cyrax
ID: 11948752
caw01,

Firstly, you need to make sure that ISA Server is logging usernames. Do this by, expanding the Monitoring Configuration, Logs then open the properties on the ISA Server Web Proxy Service. From here, click on the Fields tab and verify that the "Client user name" is ticked.
Once this is done, you can create a report job as normal.

After a report job is complete, you can view the report from Monitoring > Reports > Web Usage, etc.
Within the report, you can click on the "Top Web Users" link to view the web users.
Unfortunately, by default, ISA Server 2000 does not create reports for individual users. A third-party program such as WebSpy is required.

-Cyrax-
0
 
LVL 6

Accepted Solution

by:
KOTiS earned 500 total points
ID: 11950657
Use GFI WebMonitor for ISA Server  - It's free and powerfull:

http://www.gfi.com/webmon/


Also make sure that you enforce user authentication on your ISA server box:

http://support.gfi.com/manuals/en/dsec6/dsec6manual-1-11.html
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Make the most of your online learning experience.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Suggested Courses

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question