Solved

Whe does MS ISA 2004 Reports show IP addresses and not usernames?

Posted on 2009-04-09
3
607 Views
Last Modified: 2012-05-06
Whe does MS ISA 2004 Reports show IP addresses and not usernames?
0
Comment
Question by:Mr_Comdata
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 24109243
Because you are using an All Users authentication on your rules. You are saying you don't care who uses the rule therefore ISA doesn't care either and just logs the ip address from where the traffic oriiginated.
0
 

Author Comment

by:Mr_Comdata
ID: 24113642
How would I configure so that ISA logs the username?
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 24113956
by using a different authenticator that collects the username and password.
Double click the outbound http rule and edit the authentication to authenticated users, an ad group or whatever and remove the all users
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have been asked to explain on many, many occasions the correct way to setup network cards and DNS settings on ISA Server 2004, 2006 and forefront Threat management gateway (FTMG) and have willing done so. I have also promised my self everytime tha…
So the following errors occurs in 2 ways that I am aware of at this stage, and you receive one of the following error messages: ERROR 1. When trying to save a rule: No Web listener is specified for the Web publishing rule Autodiscovery Publishin…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question