ISA Server slow! Perfmon Counters?

Posted on 2008-11-18
Last Modified: 2013-12-04
We are having issues with an ISA Server that constantly gives us issues during certain times of the day. Some users can get through the ISA and access the internet while others time out. When we take out our ISA Server properties in our web browser (bypass proxy) we can get to the sites just fine.

Our disk subsystem consists of 15k RPM drives and our URL cache is on a seperate partition. I ran the BPATool and found some things suspect however, they are not really things that would cause ISA to time out some users requests.
Any help is appreciated. Thanks a bunch everyone!

Our ISA is natted twice but this may be lifted temperarily for testing. The ISA is within our DMZ.

Can someone tell me what counters in perfmon to search on so I can get some trend analysis statistics?

I don't know what to search for so obviously I would see lots of false positives or so many counters that I would be overwhelmed with data.

Can anyone help?
Question by:snyderkv
    LVL 5

    Accepted Solution

    Is this a new problem or has it ever worked?
    LVL 1

    Assisted Solution

    What's the physical spec of your server? How many users have you got? did you check out the ISA capacity planner?
    Is your gateway and DNS server configured correctly on the ISA server?

    I generally use the counter "Web Proxy>Average Milliseconds/request" to identify slowness. If this counter is too high this mean the request are being delay.

    Other method: run a network analyser and look for the time it take to ISA to answer the request of a client having slowness issue.

    capacity planner:
    perf counters:

    Author Comment

    Thanks I will look at those counters. Can't see how it will help me fix anythhing though especially seeing how I don't know what is bad and what is good.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Security Threats Are You Missing?

    Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

    SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
    This is a short article about OS X KeRanger, and what people can do to get rid of it.
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now