Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Is it okay to delete these log files on my ISA Server?

Posted on 2006-06-01
5
Medium Priority
?
864 Views
Last Modified: 2013-11-16
Which files are used for Reporting feature in the ISA Managment?
Can I safely delete any of these files in these directories?

\\isa\c$\WINNT\system32\LogFiles\W3SVC1
\\isa\c$\WINNT\system32\LogFiles\W3SVC1
\\isa\c$\Program Files\Microsoft ISA Server\ISALogs

0
Comment
Question by:Splunker
  • 3
  • 2
5 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 1000 total points
ID: 16809702
The W3SVC files are the audits of the web traffic etc that ISA stores. These are used to generate the reports etc of where people have visited for security, auditing and tracking purposes.

Open the ISA GUI,

select monitoring.
Open the toolbox on the right hand.
At the bottom, (right), find configure log summary
In here you can configure how many days worth of files etc it will keep.
0
 

Author Comment

by:Splunker
ID: 16809763
What are the ones in here for? \\isa\c$\Program Files\Microsoft ISA Server\ISALogs

If I do go into the GUI and Change the date to store for shorter period of time, will it automatically delete the ones that fall beyond that date since they are already out there?
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16809801
It should the next time it is due to perform a cycle. I think this is once every 24 hours.

The ISALOGS are summaries of all the events. remove them and your ISA will produce reports etc which are empty and you will have a nightmare repairing it.
0
 

Author Comment

by:Splunker
ID: 16809985
Thanks again
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16811851
No, Thank you :)
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Forefront Threat Management Gateway 2010 or FTMG comes with some very neat troubleshooting tools built-in when trying to identify what is actually happening behind the scenes within the product when traffic is passing through its interfaces. To the …
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Integration Management Part 2
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question