How To Configure ISA Server to Log to an Access Database

 

This guide will assist you to configure your Microsoft ISA Server to capture Firewall and Web Proxy activities into an Access Database.

To download my Free Access Database Click Here

  1. 1- After downloading the access database, Make a Directory in ISA Server (or any where in the network) and copy the access database into it.
  2. 2- Goto to Control Panel -> Administrative Tools -> Data Sources (ODBC)
  3.  

  4.  
  5. 3- Click on System DSN
  6. 4- Click on Add
  7.  

     

  8. 5- Select Microsoft Access Driver(*.mdb) and Click Finish
  9. 6- Type a Name and Description for your DSN
  10.  

  11.  
  12. 7- Click on Select and Select the downloaded Access Database
  13.  

  14.  
  15. 8- Click OK and exit from Data Sources Window
  16. 9- Run ISA Management Consol
  17. 10- Select your Target ISA Server
  18. 11- Click on Monitoring Configuration
  19. 12- Click on Logs
  20.  

  1. 13- Right Click on Packet Filters , Select properties
  2. 14- Switch the Log storage format from File to Databse
  3. 15- Type the ODBC data source, in this case LogsDB
  4. 16- Type PacketFilterLog as Database name.
  5.  

  6.  
  7. 17- Click OK
  8. 18- Right Click on ISA Server Firewall service Select properties
  9. 19- Switch the Log storage format from File to Databse
  10. 20- Type the ODBC data source, in this case LogsDB
  11. 21- Type FirewallLog as Database name.
  12.  

  1. 27- Click OK
  2. 28- Right Click on ISA Server Web Proxy service Select properties
  3. 29- Switch the Log storage format from File to Databse
  4. 30- Type the ODBC data source, in this case LogsDB
  5. 31- Type WebProxyLog as Database name.
  6.  

  1. 31- Click OK
and... Voila! You're Done!
  • NOTE: After a few minutes, check the ISA server's event log. You shouldn't see any errors related to ISA logging, Otherwise verify above steps.
  1. To download my Free Access Database Click Here

[ HOME ]

  1. NOTE:  Standard disclaimer applies.  Iím not responsible for ANYTHING! Backup your system and etc. before attempting to modify any of your system's configurations. This guide is for training purposes only.
  1. Email me if you have any questions or suggestions.