Solved

ISA 2000 is it possible to give non domain users access to internet if so how?

Posted on 2006-10-23
4
305 Views
Last Modified: 2013-12-04
Hello all

Basically as i said in title is it possible to give non domin users access to internet through ISA 2000
if this is possible can someone go through the steps in which i should take to set this up.

Thanks
0
Comment
Question by:SoHandy
4 Comments
 
LVL 14

Accepted Solution

by:
inbarasan earned 125 total points
ID: 17793089
Dear SoHandy,
If you allow anonymous user access then it is possible. The problem with that you can't have user based log. If not you can request your users to give User authentication details whenever they access internet.
To disable annonymous access

Open the ISA Management console. Right click on your server name and click the Properties command.
In the server’s Properties dialog box, click on the Outgoing Web Requests tab.
On the Outgoing Web Requests tab, remove the checkmark from the Ask unauthenticated users for identification checkbox.
Click Apply. Select the option to automatically restart the Web Proxy service and click OK.
Click OK in the server’s Properties dialog box.


Cheers!
Inba
0
 
LVL 37

Assisted Solution

by:Bing CISM / CISSP
Bing CISM / CISSP earned 125 total points
ID: 20390386
> The problem with that you can't have user based log.

IP address-based log is still available.
0
 
LVL 1

Expert Comment

by:Computer101
ID: 21091588
Forced accept.

Computer101
EE Admin
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
This video discusses moving either the default database or any database to a new volume.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now