Browse by Tags

Related Posts
  • Blog Post: ISA Firewall Service Process (wspsrv.exe) high CPU utilization issue

    1. Introduction   When dealing with ISA high CPU utilization where wspsrve.exe is the one consuming more resources, the first impression is that ISA is the culprit for that. There are some scenarios where this statement is true, such as this one that I documented last year. But there are other scenarios...
  • Blog Post: High CPU Utilization by Wspsrv.exe Process

    1. Introduction The Firewall service is ISA Server's main user mode service; it runs with the Network Account credentials and under the context of the process wspsrv.exe. The CPU utilization of this process might vary according to the server load and other external elements, for example: antivirus...
  • Blog Post: Forefront TMG 2010 Capacity Planning Tool Now Available

    The Forefront TMG 2010 Capacity Planning Tool , a Microsoft Excel spreadsheet with built-in workflow, is now available for download. Forefront TMG now has two resources that can help you determine the server hardware required for your deployment: · The TechNet article Forefront TMG 2010 hardware...
  • Blog Post: Hardware recommendations for Forefront TMG 2010

    In this post, we discuss the hardware recommendations for Forefront TMG, based on the number of users and deployment scenario. Enabling different features on Forefront TMG carries different costs. When considering the hardware required for your deployment, take into account the projected growth of your...
  • Blog Post: How Disk Bottleneck can affect TMG Performance?

    1. Introduction Troubleshooting performance issue is not easy regardless of the product, with TMG being no different, matter fact it is tougher because there are so many other elements involved that are external to TMG, which can play a big role on the overall performance experience. 2. General...
  • Blog Post: Reducing Kerberos requests when using KCD for web publishing.

    1. Introduction If you have read the article “Kerberos Constrained Delegation in ISA Server 2006” http://technet.microsoft.com/en-us/library/bb794858.aspx and followed the instructions how to publish a web server by using Kerberos Constrained Delegation, you might expect that the Kerberos authentication...
  • Blog Post: New Articles for Tales from the Edge

    We're happy to announce publishing of two more articles on the Tales from the Edge community site: Part 1 of a three-part series on using Network Monitor 3 to troubleshoot Firewall and TMG client traffic: Network Monitor 3.3 RWS Parser Basics, Part 1: Introduction to RWS Protocol Analysis ...
  • Blog Post: Side Effects of Incorrect DNS configuration on ISA Server: 10060 Connection Timeout Scenario

    1. Introduction Although this topic might sounds “basic stuff”, we still see many cases where DNS is the culprit. There are cases where DNS is not answering properly, not correctly configured on ISA Server and in some cases the DNS Server is actually down (easy one to fix it J ). The fact that...