Solved

(isa,TMG 2010)see what websites a specifiv user visited on a specific date

Posted on 2011-09-12
4
1,523 Views
Last Modified: 2012-05-12
Hello all,

We're using TMG 2010 in our company as a webproxy to distribute internet access, everything is running fine and smootly and we have enabled logging for webproxy and firewall, i just want to make a report for my manager that contains all the websites visited by a specific user on a specified date , i played with logs and reporting tools but no luck, any help ?

Thank you in advance.
0
Comment
Question by:a77
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 36524011
No luck as in you cannot undertand the on-screen help and the user guides and wizards or no luck in that you can read but the built-in reports have failed?
0
 

Author Comment

by:a77
ID: 36524145
the 3rd, no luck in finding your comment helpful .
if i found the selection in reports i wouldn't be here , d ick head
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 36527383
Wow, impressive. So articulate.
Open the GUI, choose logs & reports, select the logging tab and then user activity report.
Create a one-time report. Change the OVERWRITE statement to the domain\user name required and the default last 7 days to the settings available from the drop down. Shortest time is last 24 hours.
0
 

Author Comment

by:a77
ID: 36565077
yes it's working by everything except by username , i tried with ip and it's working fine, but when you filter by username it doesn't show anything, any ideas?
Thanks anyway
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question