?
Solved

ISA 2000 is it possible to give non domain users access to internet if so how?

Posted on 2006-10-23
4
Medium Priority
?
318 Views
Last Modified: 2013-12-04
Hello all

Basically as i said in title is it possible to give non domin users access to internet through ISA 2000
if this is possible can someone go through the steps in which i should take to set this up.

Thanks
0
Comment
Question by:SoHandy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 14

Accepted Solution

by:
inbarasan earned 500 total points
ID: 17793089
Dear SoHandy,
If you allow anonymous user access then it is possible. The problem with that you can't have user based log. If not you can request your users to give User authentication details whenever they access internet.
To disable annonymous access

Open the ISA Management console. Right click on your server name and click the Properties command.
In the server’s Properties dialog box, click on the Outgoing Web Requests tab.
On the Outgoing Web Requests tab, remove the checkmark from the Ask unauthenticated users for identification checkbox.
Click Apply. Select the option to automatically restart the Web Proxy service and click OK.
Click OK in the server’s Properties dialog box.


Cheers!
Inba
0
 
LVL 37

Assisted Solution

by:bbao
bbao earned 500 total points
ID: 20390386
> The problem with that you can't have user based log.

IP address-based log is still available.
0
 
LVL 1

Expert Comment

by:Computer101
ID: 21091588
Forced accept.

Computer101
EE Admin
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question