Solved

(isa,TMG 2010)see what websites a specifiv user visited on a specific date

Posted on 2011-09-12
4
1,539 Views
Last Modified: 2012-05-12
Hello all,

We're using TMG 2010 in our company as a webproxy to distribute internet access, everything is running fine and smootly and we have enabled logging for webproxy and firewall, i just want to make a report for my manager that contains all the websites visited by a specific user on a specified date , i played with logs and reporting tools but no luck, any help ?

Thank you in advance.
0
Comment
Question by:a77
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 36524011
No luck as in you cannot undertand the on-screen help and the user guides and wizards or no luck in that you can read but the built-in reports have failed?
0
 

Author Comment

by:a77
ID: 36524145
the 3rd, no luck in finding your comment helpful .
if i found the selection in reports i wouldn't be here , d ick head
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 36527383
Wow, impressive. So articulate.
Open the GUI, choose logs & reports, select the logging tab and then user activity report.
Create a one-time report. Change the OVERWRITE statement to the domain\user name required and the default last 7 days to the settings available from the drop down. Shortest time is last 24 hours.
0
 

Author Comment

by:a77
ID: 36565077
yes it's working by everything except by username , i tried with ip and it's working fine, but when you filter by username it doesn't show anything, any ideas?
Thanks anyway
0

Featured Post

Webinar June 1st - Attacking Ransomware  

The global cyberattack that corrupted hundreds of thousands of computer systems on May 12th had a face, name, & price tag that we’ve seen all too often in recent years: Ransomware. With the stakes – and costs – of a ransomware attack higher than ever, is your business prepared ?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question