Solved

ISA web proxy logs are full of z.about.com

Posted on 2006-10-25
5
126 Views
Last Modified: 2013-12-04
I was looking at our proxy logs and noticed that there are thousands of hits from z.about.com - especially at night.  Can anyone help? There is no ip address associated with the hits.
0
Comment
Question by:lindalew_99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 15

Expert Comment

by:plimpias
ID: 17808595
You may have spyware on one of the machines, what type of proxy server are you using? you'l need to get more information regarding the source so you can resolve the issue.
0
 
LVL 15

Expert Comment

by:plimpias
ID: 17808601
Meant what version, 2k or 2k6?
0
 
LVL 1

Author Comment

by:lindalew_99
ID: 17811308
The server is Windows 2003 running ISA server 2000.  I can't find the maching (we have over 900) because the ip address is not showing up on the server.

Thanks
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 250 total points
ID: 18828204
Is this still an issue?
z.about.com is an advertising and tracking site as you probably know already.
Create a domain group for *.about.com
Put a deny rule for the domain group above your allowed internet rules. Someone will shout if it is a requirement for it to be enabled.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 18837756
Thanks :)
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

689 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question