This article describes how the report logs record any anonymous logon attempts when logging is enabled for the Web Proxy service in Internet Security and Acceleration (ISA) Server and Proxy Server version 2.0.
↑ Back to the top
When logging is enabled for the Web Proxy service in ISA Server, the report logs record a number of anonymous logon attempts, even if anonymous access is not permitted.
When a browser sends a Get request for a Uniform Resource Locator (URL) to the proxy server, the browser first attempts an anonymous connection. If authentication is required, there are additional requests made by the client computer that pass these credentials to ISA Server. Each of these requests are recorded in the logs of ISA Server.
By default, each request sent to ISA Server is logged, which can include both unsuccessful and successful attempts.
To enable authentication in ISA Server, select either the server or array properties. Click either the Outgoing Web Requests tab or the Incoming Web Requests tab, and then click to select the Ask authenticated users for identification check box. More specific settings can be configured in the same location under "Identification", including the authentication type and the domain settings. To deny or to enable access by a user or a group, make the necessary settings under "Protocol Rules" in either the Enterprise, Array, or Server policy.
↑ Back to the top