Solved

How to block access based on a word in a url in ISA server 2006?

Posted on 2008-11-01
6
1,065 Views
Last Modified: 2013-12-04
I want to block access based on a word in a url in ISA server 2006? It seems it couldn't block the words in an accurate manner. for example when I try to block access based on url sets and add a rule *sex*, when there is sex in a url, it couldn't recognize the site and doesn't block it, neither I couldn't block it using http headers.
Is there any other way to accomplish this task?
0
Comment
Question by:majidhajali
  • 3
  • 2
6 Comments
 
LVL 19

Accepted Solution

by:
Stephen Manderson earned 250 total points
ID: 22857480
Hi there

This should do the trick for you;
http://www.elmajdal.net/isaserver/Keyword_Filtering_With_ISA_Server_2006.aspx

Regards
Steve
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 22857954
GFI Web Monitor, although an add-on to ISA, is a very good tool for this. It has a straight-foward gui, common-sense approach, and it works on all sorts of categories such as keywords, topics, themes, pictures/images etc.
0
 
LVL 19

Expert Comment

by:Stephen Manderson
ID: 22859800
Hey Keith

We should be pushing for comission from GFI. lol
0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 
LVL 19

Expert Comment

by:Stephen Manderson
ID: 22859801
commission*
0
 
LVL 4

Author Comment

by:majidhajali
ID: 22860237
Dear MrManderson,
the web page didn't open. :(
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 22860587
True lol
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question