Hi Mark, Those are accurate logs. Every browser makes anonymous connections until asked for credentials. Jim Harrison MCP(NT4, W2K), A+, Network+, PCG http://isaserver.org/authors/harrison/ Read the books! ----- Original Message ----- From: "Mark Harris" <harris_m@xxxxxxxxxxxxxxxxx> To: "[ISAserver.org Discussion List]" <isalist@xxxxxxxxxxxxx> Sent: Saturday, May 11, 2002 8:46 PM Subject: [isalist] Log Files http://www.ISAserver.org Hi I notice that my log files contain entries for "anonymous" even though I have "ask for authentication" and no all/any content or protocol rules. I'm confused, can anybody help? i.e. how can I ensure that the log files contain only user names so I can then use the user name to create accurate usage reports based on user department. Thanks Mark ------------------------------------------------------ You are currently subscribed to this ISAserver.org Discussion List as: jim@xxxxxxxxxxxx To unsubscribe send a blank email to $subst('Email.Unsub')