Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Securing Exchange Server 2010 with ISA Server : Logging ISA Traffic

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/29/2011 11:24:43 AM
One of the most powerful troubleshooting tools at the disposal of SharePoint and ISA administrators is the logging mechanism, which gives live or archived views of the logs on an ISA server, and allows for quick and easy searching and indexing of ISA Server log information, including every packet of data that hits the ISA server.

Note

Many of the advanced features of ISA logging are only available when using MSDE or SQL databases for the storage of the logs.


Examining ISA Logs

The ISA logs are accessible via the Logging tab in the details pane of the Monitoring node, as shown in Figure 1. They offer administrators the ability to watch, in real time, what is happening to the ISA server, whether it is denying connections, and what rule is being applied for each Allow or Deny statement.

Figure 1. Examining ISA logging.

The logs include pertinent information on each packet of data, including the following key characteristics:

  • Log Time— The exact time the packet was processed.

  • Destination IP— The destination IP address of the packet.

  • Destination Port— The destination TCP/IP port, such as port 80 for HTTP traffic.

  • Protocol— The specific protocol that the packet utilized, such as HTTP, LDAP, RPC, or others.

  • Action— The type of action the ISA server took on the traffic, such as initiating the connection or denying it.

  • Rule— The particular firewall policy rule applied to the traffic.

  • Client IP— The IP address of the client that sent the packet.

  • Client Username— The username of the requesting client. Note that this is only populated if using the Firewall Client.

  • Source Network— The source network from which the packet came.

  • Destination Network— The network where the destination of the packet is located.

  • HTTP Method— If HTTP traffic, the type of HTTP method utilized, such as GET or POST.

  • URL— If HTTP is used, the exact URL that was requested.

By searching through the logs for specific criteria in these columns, such as all packets sent by a specific IP address, or all URLs that match http://sharepoint.companyabc.com, advanced troubleshooting and monitoring is simplified.

Customizing Logging Filters

What is displayed in the details pane of the Logging tab is a reflection of only those logs that match certain criteria in the log filter. It is highly useful to use the filter to weed out the extraneous log entries, which just distract from the specific monitoring task. For example, on many networks, an abundance of NetBIOS broadcast traffic makes it difficult to read the logs. For this reason, a specific filter can be created to only show traffic that is not NetBIOS traffic. To set up this particular type of rule, do the following:

1.
From the ISA Admin console, click the Monitoring node from the console tree, and select the Logging tab in the details pane.

2.
On the Tasks tab in the tasks pane, click the Edit Filter link.

3.
In the Edit Filter dialog box, change the Filter by, Condition, and Value fields to display Protocol, Not Equal, NetBios Datagram, and then click Add to List.

4.
Repeat for the NetBios Name Service and the NetBios Session values, so that the dialog box looks like the one displayed in Figure 2.

Figure 2. Creating a custom logging filter.

5.
Click Start Query.

Note

It cannot be stressed enough that this logging mechanism is quite literally the best tool for troubleshooting ISA access. For example, it can be used to tell if traffic from clients is even hitting the ISA server, and if it is, what is happening to it (denied, accepted, and so on).



Other -----------------
- Securing Exchange Server 2010 with ISA Server : Managing and Controlling Simple Mail Transfer Protocol (SMTP) Traffic
- BizTalk 2010 Recipes : Document Mapping - Calling Compiled Assemblies
- BizTalk 2010 Recipes : Document Mapping - Creating Functoid If-Then-Else Logic
- Windows Server 2008 Server Core : Managing Directory Services Using the WMIC NTDomain Alias
- Windows Server 2008 Server Core : Securing the System - Converting Event Trace Logs with the TraceRpt Utility
- Leveraging Social Networking Tools in SharePoint 2010 : Components of My Sites (part 2) - Using Bookmarklets
- Leveraging Social Networking Tools in SharePoint 2010 : Components of My Sites (part 1) - Creating and Exploring a My Site
- Leveraging Social Networking Tools in SharePoint 2010 : User Profile Job Review
- Leveraging Social Networking Tools in SharePoint 2010 : Mapping a SharePoint Profile Field to Active Directory
- BizTalk 2010 Recipes : Document Mapping - Using the Date and Time Functoids
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server