Event Id | 15109 |
Source | POP Intrusion Detection Filter |
Description | Quarantine in the Remote Access Policy (either locally or on the RADIUS server) cannot be enabled when ISA Server Quarantine is disabled or set to use ISA Server Quarantine policy. The VPN user 1 will be disconnected. To setup Quarantine in ISA Server refer to ISA Server help. |
Event Information | According To Mcirosoft: Quarantine settings should only be enabled through ISA Server. If ISA Server detects that Routing and Remote Access service is also configured to apply quarantine, in order to prevent a configuration conflict, ISA Server does not allow the connection. Resolution: Remove the quarantine configuration attributes from the Routing and Remote Access service policies.Enable Quarantine through ISA Server. To do this, in the console tree of ISA Server Management, click Configuration, and then click Networks. In the details pane, select the Quarantine VPN Clients network. In the Tasks tab, click Edit Selected Network, then click the Quarantine tab. In the Quarantine tab, click the Enable Quarantine Control checkbox. |
Reference Links | Microsoft product: Internet Security and Acceleration Server Version: 4.0.3443.594 Event Source: POP Intrusion Detection Filter Event ID: 15109 |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.