Share via


FW_H_CnfRepContent

To configure report contents for a report job

  1. In the console tree of ISA Server Management, click Monitoring.

  2. In the details pane, click the Reports tab.

  3. On the Tasks tab, click Create and Configure Report Jobs.

  4. Select the applicable report job, and then click Edit.

  5. On the Content tab, select which of the following reports should be generated:

    • Summary
    • Web usage
    • Application usage
    • Traffic and utilization
    • Security

Note

To open ISA Server Management, click Start, point to All Programs, point to Microsoft ISA Server, and then click ISA Server Management.
For ISA Server 2006 Enterprise Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Arrays, expand Array_Name, and then click Monitoring.
For ISA Server 2006 Standard Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Server_Name, and then click Monitoring.

Important

When you use the New Report Wizard to create a report, you can specify the types of reports to generate on the Report Types page of the wizard.
Summary reports include a set of reports with common information about protocol usage, Web sites accessed, cache information, and general traffic activity. These reports are most relevant to the network administrator or the person managing or planning a company's Internet connectivity.
Web usage reports include a set of reports that display top Web users, common responses, and browsers. These reports are most relevant to the network administrator or the person managing or planning a company's Internet connectivity. It shows how the Web is being used in a company.
Application usage reports illustrate Internet application usage in a company, including incoming and outgoing traffic, top users, client applications, and destinations. These reports are most relevant to the network administrator or the person managing or planning a company's Internet connectivity, because they can help you plan network capacity and determine bandwidth policies.
Traffic and utilization reports illustrate total Internet usage by application, protocol, and direction. These reports also show average traffic and peak simultaneous connections, cache hit ratio, errors, and other statistics. These reports can help plan and monitor network capacity and determine bandwidth policies.
Security reports list attempts to breach network security. Security reports can help identify attacks or security violations after they have occurred.