With ISA, it appears that you can use it as a transparent proxy (no auth) and still log according to user? I personally don't see how this is possible. Can anyone confirm or deny this?
--Dave
With ISA, it appears that you can use it as a transparent proxy (no auth) and still log according to user? I personally don't see how this is possible. Can anyone confirm or deny this?
--Dave