Solved

Employee Activity Reports from ISA 2004

Posted on 2009-07-16
4
382 Views
Last Modified: 2012-05-07
We have ISA Server 2004 installed.  Rules are setup to require http proxy users to authenticate.  Are there any open source/free tools out there to report on employee web usage?  We need to see the AD authenticated username, site visited, and would be great if we could see if the access was blocked or not.

The closest thing we have found is Cyfin Reporter, unfortuantly its rather expensive.  Thanks
0
Comment
Question by:markswelch
  • 2
4 Comments
 
LVL 6

Accepted Solution

by:
Hisham_Elkouha earned 250 total points
ID: 24870445
The best tool for that is GFI Webmonitor 4 , easy , powerful and fantastic.
0
 
LVL 6

Expert Comment

by:Hisham_Elkouha
ID: 24870475
Talking about free softwares , try to generate a report from ISA Monitoring Tab , go to Reports and generate a new Report.
0
 
LVL 2

Author Comment

by:markswelch
ID: 24897521
We've taken a look at the built-in reports for ISA, we're trying to find a more granular report at the user level.  We need to be able to pull a report for a users web usage for a defined period of time.  Thanks for your help.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In Africa (and potentially where you live…), reliability of ISPs is questionable.  With the increased reliance on e-mail as one of the primary forms of communication, the costs to business are significant based on interuption of ISP Connectivity.  T…
Forefront Threat Management Gateway 2010 or FTMG comes with some very neat troubleshooting tools built-in when trying to identify what is actually happening behind the scenes within the product when traffic is passing through its interfaces. To the …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question