In the console tree of ISA Server Management, click
Monitoring.
In the details pane, click the Reports tab.
On the Tasks tab, click Create and Configure Report
Jobs.
Select the applicable report job, and then click
Edit.
On the Content tab, select which of the following
reports should be generated:
Summary
Web usage
Application usage
Traffic and utilization
Security
Notes
To open ISA Server Management, click Start, point to
All Programs, point to Microsoft ISA Server, and then
click ISA Server Management.
For ISA Server 2006 Enterprise Edition, expand
Microsoft Internet Security and Acceleration
Server 2006, expand Arrays, expand
Array_Name, and then click Monitoring.
For ISA Server 2006 Standard Edition, expand Microsoft
Internet Security and Acceleration Server 2006, expand
Server_Name, and then click Monitoring.
Important
When you use the New Report Wizard to create a report, you can
specify the types of reports to generate on the Report Types
page of the wizard.
Summary reports include a set of reports with common
information about protocol usage, Web sites accessed, cache
information, and general traffic activity. These reports are most
relevant to the network administrator or the person managing or
planning a company's Internet connectivity.
Web usage reports include a set of reports that display top Web
users, common responses, and browsers. These reports are most
relevant to the network administrator or the person managing or
planning a company's Internet connectivity. It shows how the Web is
being used in a company.
Application usage reports illustrate Internet application usage
in a company, including incoming and outgoing traffic, top users,
client applications, and destinations. These reports are most
relevant to the network administrator or the person managing or
planning a company's Internet connectivity, because they can help
you plan network capacity and determine bandwidth policies.
Traffic and utilization reports illustrate total Internet usage
by application, protocol, and direction. These reports also show
average traffic and peak simultaneous connections, cache hit ratio,
errors, and other statistics. These reports can help plan and
monitor network capacity and determine bandwidth policies.
Security reports list attempts to breach network security.
Security reports can help identify attacks or security violations
after they have occurred.