With ISA, it appears that you can use it as a transparent proxy (no
auth) and still log according to user? I personally don't see how this
is possible. Can anyone confirm or deny this?

--Dave

Reply via email to