Solved

ISA 2000 is it possible to give non domain users access to internet if so how?

Posted on 2006-10-23
4
306 Views
Last Modified: 2013-12-04
Hello all

Basically as i said in title is it possible to give non domin users access to internet through ISA 2000
if this is possible can someone go through the steps in which i should take to set this up.

Thanks
0
Comment
Question by:SoHandy
4 Comments
 
LVL 14

Accepted Solution

by:
inbarasan earned 125 total points
ID: 17793089
Dear SoHandy,
If you allow anonymous user access then it is possible. The problem with that you can't have user based log. If not you can request your users to give User authentication details whenever they access internet.
To disable annonymous access

Open the ISA Management console. Right click on your server name and click the Properties command.
In the server’s Properties dialog box, click on the Outgoing Web Requests tab.
On the Outgoing Web Requests tab, remove the checkmark from the Ask unauthenticated users for identification checkbox.
Click Apply. Select the option to automatically restart the Web Proxy service and click OK.
Click OK in the server’s Properties dialog box.


Cheers!
Inba
0
 
LVL 37

Assisted Solution

by:Bing CISM / CISSP
Bing CISM / CISSP earned 125 total points
ID: 20390386
> The problem with that you can't have user based log.

IP address-based log is still available.
0
 
LVL 1

Expert Comment

by:Computer101
ID: 21091588
Forced accept.

Computer101
EE Admin
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now