?
Solved

ISA 2004 identify users in logs

Posted on 2006-04-14
7
Medium Priority
?
180 Views
Last Modified: 2013-11-16
Hi,

In Proxy 2 and ISA 2000 there used to be a option so you could identify users in the log files, by their usersnames. This could be done from what they had logged on as, or you could get a username and password  box pop up in the web browser asking them to log in.

I cant find where this is in isa 2004. (both optioNs) any ideas.

Regards

R
0
Comment
Question by:supportsoft
  • 5
  • 2
7 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16452492
You need to install the ISA firewall client. Have you done this?
0
 
LVL 4

Author Comment

by:supportsoft
ID: 16455357
on each client? if so no.

Plus Do I have to as only want to use isa as a proxy.

regards
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16456077
Proxy only? OK.

On the outgoing rule, have you allowed all users or authenticated users?
0
What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 1000 total points
ID: 16459135
Reason for asking is they are not 'options' as such anymore.

open the gui, select configuration - networks - internal and open its properties. here you can set the authentication type and method.
or
In the rule you have created, select its properties and go into the users tab.
You can click add and create specific groups to allow and also put in the/some exceptions. The exceptions will be prompted.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16459138
depending on the authentiation methods selected. Sorry about the break up of posts, the lights are off so I missed the backspace key and keep getting the return key.
0
 
LVL 4

Author Comment

by:supportsoft
ID: 16495765
works a treat cheers
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16500811
More than welcome :)
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
Screencast - Getting to Know the Pipeline
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question