?
Solved

ISA Server Monitoring - Exclude users

Posted on 2009-05-08
3
Medium Priority
?
622 Views
Last Modified: 2013-11-16
Hello,

I have an ISA Server 2000, and it is set up for monitoring all users, is there a way to exclude users or IP addresses from being monitored?

Thanks
Karl
0
Comment
Question by:karl_0090
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 7

Accepted Solution

by:
myhc earned 801 total points
ID: 24334468
Long time since I used ISA2000.. I don't think this is possible.
I currently use an application called "Internet Access Monitor" http://www.redline-software.com/eng/

This works well with ISA2000, ISA2004,ETC..... and will allow you to get a good over view of usage.
Aloso allowing you to get reports sned via email to deparment heads etc..

Good product!
0
 
LVL 7

Assisted Solution

by:myhc
myhc earned 801 total points
ID: 24334484
Also, there is aplugin for ISA 2004 called "TQuota" it's free for 5 users and you can set limits to download costs.

Would need to check if it works with ISA2000
0
 
LVL 6

Assisted Solution

by:Hisham_Elkouha
Hisham_Elkouha earned 699 total points
ID: 24358932
It is time to upgrade to ISA 2004 or 2006.

In your case try to use Network Access Monitor or GFI WebMonitor.
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month11 days, 12 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question