Avatar of sbumpas
sbumpas

asked on 

Forefront TMG client showing ? in session monitor

I have deployed the Forefront TMG clients to the majority of my client PCs, but I notice in the session monitor that all of the client usernames have (?) after them. Is this normal?  If not, what action is recommended?

Also, there are still some 'anonymous' entries under Client username, even though the same IP has other connections that list the username properly.

It feels like I missed a step?
Microsoft Forefront ISA Server

Avatar of undefined
Last Comment
Suliman Abu Kharroub
Avatar of Suliman Abu Kharroub
Suliman Abu Kharroub
Flag of Jordan image

>>Also, there are still some 'anonymous' entries under Client username, even though the same IP has other connections that list the username properly.

these sessions do not require authentication, so no user name is required for them. thats why users appear as "anonymous"
Avatar of sbumpas
sbumpas

ASKER

that makes sense - any suggestions on the (?)'s?
ASKER CERTIFIED SOLUTION
Avatar of Suliman Abu Kharroub
Suliman Abu Kharroub
Flag of Jordan image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of sbumpas
sbumpas

ASKER

That's what I was looking for - thanks!

Unfortunately we cannot require authentication because part of Internal network is public wireless; I will ignore this  issue for now.
To make it clear, it depends on the allow rule if it require authentication or not (all users).

If not require, anonymous users will appear.
If it require and ISA client used, then a "?" mark will appear at the end.
you are welcome...
Microsoft Forefront ISA Server
Microsoft Forefront ISA Server

Microsoft Forefront, formerly known as Internet Security and Acceleration Server (ISA Server), is a network router, firewall, antivirus program, VPN server and web cache that runs on Windows servers. It includes identity management and protection systems, and discontinued systems for threat management and network protection, along with protection for Sharepoint and Exchange. The scope of discussions includes forward and reverse proxy, application and service publishing, virtual private networks (VPNs), outbound access rules, SSL certificates and network routing within either a single node or an highly-available array pairing.

10K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo