Solved

ISA2003-report for bandwith

Posted on 2007-04-05
6
248 Views
Last Modified: 2013-12-04
hello all.
I'm using an ISA 2003 firewall between my LAN and internet. My LAN has around 400 clients. now I have problem: some of users is infected with spyware, and it sends many mails, and use most the bandwith.

Using ISA 2003, how can I detech who is infected with spyware? or saying in other way, who use most my bandwith?

regard
hva.
0
Comment
Question by:hva123456
  • 4
  • 2
6 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 18857051
No such thing as ISA 2003 - its isa2000, 2004 or 2006.
If its isa2000 then you can use the bandwidth options and the ISA log files.

If its ISA2004 or ISA2006, the bandwidth control was removed.
Instead, open the ISA gui,
select monitoring - reports
Create and run a report for the required period and this will produce a decent html report of all activity, to where and by whom and from where.
Also, in the gui, select monitoring - logging.
click start query - this starts the live logging (realtime) monitor.
0
 

Author Comment

by:hva123456
ID: 18862639
The problem is we cannot have a report on a specific port for each user
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 18862676
Again, what version of ISA are you actually running? Bandwidth reporting is not provided in isa2004/2006 so is not an isa fault; its a feature :)
There are add-ons/plug-ins that can be purchased to provide that functionality though.


0
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 

Author Comment

by:hva123456
ID: 18879998
I use ISA 2004,. So we dont have the solution at the moment?
0
 
LVL 51

Assisted Solution

by:Keith Alabaster
Keith Alabaster earned 500 total points
ID: 18880569
<<If its ISA2004 or ISA2006, the bandwidth control was removed.
Instead, open the ISA gui,
select monitoring - reports
Create and run a report for the required period and this will produce a decent html report of all activity, to where and by whom and from where.
Also, in the gui, select monitoring - logging.
click start query - this starts the live logging (realtime) monitor>>

If you want it more granular then goto the monitoring - logging section.
Edit the Query to use the criteria you want reported against and the time action to cover the period to report against. Select a single user if you wish
open the toolbox window on the right and select copy all to clipboard
Copy this into Excel and you can graph it to your hearts content.

Lastly, the data is all stored in an MSDE database. You can query this directly on the ISA box (ISA's security features will stop you querying the msde from another machine) to pull the info as you want.

As mentioned, ISA does not perform bandwidth loading so it is not a function of the product.


0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 19036619
Thanks :)
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Assess most serious Linux privilege escalation bug 17 176
Changing the domain admin password 9 92
Which the best UTM recommended ? 2 109
SQL Server Communications Audit 5 110
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question