Solved

ISA web proxy logs are full of z.about.com

Posted on 2006-10-25
5
123 Views
Last Modified: 2013-12-04
I was looking at our proxy logs and noticed that there are thousands of hits from z.about.com - especially at night.  Can anyone help? There is no ip address associated with the hits.
0
Comment
Question by:lindalew_99
  • 2
  • 2
5 Comments
 
LVL 15

Expert Comment

by:plimpias
ID: 17808595
You may have spyware on one of the machines, what type of proxy server are you using? you'l need to get more information regarding the source so you can resolve the issue.
0
 
LVL 15

Expert Comment

by:plimpias
ID: 17808601
Meant what version, 2k or 2k6?
0
 
LVL 1

Author Comment

by:lindalew_99
ID: 17811308
The server is Windows 2003 running ISA server 2000.  I can't find the maching (we have over 900) because the ip address is not showing up on the server.

Thanks
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 250 total points
ID: 18828204
Is this still an issue?
z.about.com is an advertising and tracking site as you probably know already.
Create a domain group for *.about.com
Put a deny rule for the domain group above your allowed internet rules. Someone will shout if it is a requirement for it to be enabled.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 18837756
Thanks :)
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question