Solved

ISA 2000 is it possible to give non domain users access to internet if so how?

Posted on 2006-10-23
4
308 Views
Last Modified: 2013-12-04
Hello all

Basically as i said in title is it possible to give non domin users access to internet through ISA 2000
if this is possible can someone go through the steps in which i should take to set this up.

Thanks
0
Comment
Question by:SoHandy
4 Comments
 
LVL 14

Accepted Solution

by:
inbarasan earned 125 total points
ID: 17793089
Dear SoHandy,
If you allow anonymous user access then it is possible. The problem with that you can't have user based log. If not you can request your users to give User authentication details whenever they access internet.
To disable annonymous access

Open the ISA Management console. Right click on your server name and click the Properties command.
In the server’s Properties dialog box, click on the Outgoing Web Requests tab.
On the Outgoing Web Requests tab, remove the checkmark from the Ask unauthenticated users for identification checkbox.
Click Apply. Select the option to automatically restart the Web Proxy service and click OK.
Click OK in the server’s Properties dialog box.


Cheers!
Inba
0
 
LVL 37

Assisted Solution

by:bbao
bbao earned 125 total points
ID: 20390386
> The problem with that you can't have user based log.

IP address-based log is still available.
0
 
LVL 1

Expert Comment

by:Computer101
ID: 21091588
Forced accept.

Computer101
EE Admin
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question