Solved

How to block access based on a word in a url in ISA server 2006?

Posted on 2008-11-01
6
1,091 Views
Last Modified: 2013-12-04
I want to block access based on a word in a url in ISA server 2006? It seems it couldn't block the words in an accurate manner. for example when I try to block access based on url sets and add a rule *sex*, when there is sex in a url, it couldn't recognize the site and doesn't block it, neither I couldn't block it using http headers.
Is there any other way to accomplish this task?
0
Comment
Question by:majidhajali
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 19

Accepted Solution

by:
Stephen Manderson earned 250 total points
ID: 22857480
Hi there

This should do the trick for you;
http://www.elmajdal.net/isaserver/Keyword_Filtering_With_ISA_Server_2006.aspx

Regards
Steve
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 22857954
GFI Web Monitor, although an add-on to ISA, is a very good tool for this. It has a straight-foward gui, common-sense approach, and it works on all sorts of categories such as keywords, topics, themes, pictures/images etc.
0
 
LVL 19

Expert Comment

by:Stephen Manderson
ID: 22859800
Hey Keith

We should be pushing for comission from GFI. lol
0
Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

 
LVL 19

Expert Comment

by:Stephen Manderson
ID: 22859801
commission*
0
 
LVL 4

Author Comment

by:majidhajali
ID: 22860237
Dear MrManderson,
the web page didn't open. :(
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 22860587
True lol
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have been asked to explain on many, many occasions the correct way to setup network cards and DNS settings on ISA Server 2004, 2006 and forefront Threat management gateway (FTMG) and have willing done so. I have also promised my self everytime tha…
In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question