Proxy Server 2.0 Release NotesLast reviewed: October 23, 1997Article ID: Q174922 |
The information in this article applies to:
********************************************************************** Microsoft(R) Proxy Server 2.0 Release Notes September 1997********************************************************************** (c)1997 Microsoft Corporation. All rights reserved.Please review this entire document before you install Microsoft Proxy Server version 2.0. It contains important information about installing and using Proxy Server, and it supplements the on-line documentation that is installed with the product. CONTENTS * Software Requirements * Internet Information Server Fix * Internet Explorer 3.02, Script Routing & NTLM * Internet Explorer 3.x, NTLM, & SSL * Display Not Synchronized When Viewing Documentation On-Line * Installing Internet Information Server 4.0 With Proxy Server * Proxy Server With Single Network Adapter Configuration * Client Configuration Dialog Box * Starting and Stopping the Socks Proxy Service * NetBIOS Packet Filtering Issues * WinSock Proxy Domain Filters * Enabling Passive FTP For Web Proxy * Server Proxy Issues For Using Exchange With DNS * Packet Filtering Slows Performance if server uses Identd * Additional Notes On Configuring Packet Filters * Administering Arrays * Registry Entries for Arrays * Registry Entry for Disabling Socks Proxy * Remote Use Of System Services With WinSock Proxy * Setting Autodisconnect for Auto Dial * Web Browsers That Support SOCKS v4.3 Do Not Proxy DNS Lookups * Using Routing and Remote Access Service (RRAS) * Logging to an Access Database * Acknowledgments
SOFTWARE REQUIREMENTS The following components must already be installed on the server computer before you install Proxy Server 2.0: * Microsoft Windows NT(R) Server version 4.0 or later * Microsoft Internet Information Server version 3.0 or later * Service Pack 3 or later for Microsoft Windows NT Server 4.0 INTERNET INFORMATION SERVER FIX There is a bug in Microsoft Internet Information Server Version 3.0 that can cause the Web service to abnormally terminate. You should download and install the software fix on any computer that runs IIS and/or Microsoft Proxy Server. You can use your browser to connect to: ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/ hotfixes-postSP3/iis-fix/ For more information on this IIS issue, read the Q143484.txt file. For information on how to download and install the fix, read the readme.txt file. INTERNET EXPLOER 3.02, SCRIPT ROUTING AND NTLM When using Proxy's routing script with Internet Explorer version 3.02, NTLM authentication does not work properly. This is fixed in IE version 4.0. INTERNET EXPLORER 3.X, NTCR, & SSL When using some versions of Internet Explorer version 3.x with Micro- soft Proxy Server, NTCR authentication does not work properly when accessing secure web sites (https://...). Please check IE information on the Microsoft Corporation Web page, or Microsoft Knowledge Base, etc. for an update on this issue. DISPLAY NOT SYNCHRONIZED WHEN VIEWING DOCUMENTATION ON-LINE Occasionally when viewing the on-line documentation, you may detect problems with the display topics being unsynchronized with a selected topic in the contents view. This problem has been reported during some installations, particularly where "Index" mode is used to view the table of contents. If you detect this problem, reselecting the topic appears to resolve the problem and refresh the display correctly. To reselect a topic and refresh the display:
Note: As an option, you may redisplay a topic in "Topics Found" by clicking it once and then clicking "Display." INSTALLING INTERNET INFORMATION SERVER 4.0 WITH PROXY SERVER Note: The information provided in this section is current for installing and using the Beta 3 release of Microsoft Internet Information Server (IIS) 4.0 with Microsoft Proxy Server. For possible changes between Beta 3 and the final release of IIS 4.0, review final release notes for IIS 4.0. >>> Upgrading to IIS 4.0 with Microsoft Proxy Server 1.0 Before installing IIS 4.0, you must upgrade from MSP 1.0 to MSP 2.0. You can upgrade and install MSP 2.0 using an in-place upgrade directly over your previous installation of MSP 1.0. There is no need to uninstall MSP 1.0 prior to upgrading. In addition, MSP maintains prior server configuration settings, such as Access Control Lists (ACLs) and other settings, after the upgrade to MSP 2.0 is completed. >>> Upgrading to IIS 4.0 with Microsoft Proxy Server 2.0 Once you upgrade to use IIS 4.0 on a server computer running MSP 2.0 and IIS 3.0, you will need to run MSP 2.0 setup again. This rein- stallation is needed because IIS 4.0 installs Microsoft Proxy Server as a global ISAPI filter for all Web servers. Repeating MSP 2.0 setup configures Microsoft Proxy Server correctly, as a non-global filter of the IIS default Web service for the local server computer (or "localhost"). There is no need to uninstall MSP 2.0 prior to upgrading to IIS 4.0. Also, MSP 2.0 maintains prior settings, such as Access Control Lists (ACLs) and other configuration settings when in-place reinstallation of MSP 2.0 is completed. >>>Verifying Authentication Settings After IIS 4.0 is Installed After you have upgraded to IIS 4.0, you should verify that "Password Authentication" settings are maintained and correctly configured as you have chosen to use them in IIS 3.0. For IIS 3.0, "Password Authentication" properties are set using the Internet Service Manager (ISM). To view or modify these settings using ISM, do the following:
open the IIS management console as described in step 1 using a the following alternate shortcut: From the Start menu, select "Programs"-->"Windows NT 4.0 Option Pack"-->"Microsoft Internet Information Server"-->"Internet Service Manager"PROXY SERVER WITH SINGLE NETWORK ADAPTER CONFIGURATION You can run Microsoft Proxy Server on a computer with only a single internal network adapter, such as for a chained downstream configura- tion or a caching-only configuration. Since such a computer has a single IP address, the following considerations apply: * Packet filtering cannot be enabled. * It is advised that you either disable the WinSock Proxy service, or disable access control for the WinSock Proxy service if the Proxy Server computer is connected to the Internet.CLIENT CONFIGURATION DIALOG BOX There is a check box in the "Client Configuration" dialog box that is missing from the product's online documentation. This check box can be used to determine whether or not Web browsers use the Configuration URL to automatically download a client configuration script. The check box is "Configure Web browsers to use Automatic Configuration", and is located under "Automatically configure Web browser during client setup." By default, this feature is disabled. In addition, the client configuration file, Mspclnt.ini, has an entry "Set Browsers to use Auto Config" in the [Common] section to support this feature. STARTING AND STOPPING THE SOCKS PROXY SERVICE In the on-line documentation, under "Administration"-->"Setting Server Parameters"-->"Configuring Auto Dial" -> "Restarting Services", the following command-line syntax is invalid:
NET STOP | START SPSVC for the Socks Proxy serviceProxy Server's Web Proxy and Socks Proxy run within the WWW service of IIS. To stop or start these proxy services, use:
NET STOP | START W3SVCNETBIOS PACKET FILTERING ISSUES By default, packet filtering is not enabled when Microsoft Proxy Server is installed. Where packet filtering is enabled, this section details recommended configuration options for secure and reliable operation of the proxy server depending on your need to allow or restrict NetBIOS traffic on the server's external network interface. With packet filtering enabled on Microsoft Proxy Server, several pre- defined filters for NetBIOS are provided for your use. Depending on your need to support NetBIOS traffic on the server's external network interface, you may choose among the following ways to configure WINS client and NetBIOS packet filtering options for Microsoft Proxy Server: * If NetBIOS traffic is not used or supported on the external net- work, the WINS client should be disabled in bindings for the server's external network adapter card. In addition, the prede- fined NetBIOS filters should NOT be activated.* If NetBIOS traffic is used and supported on the external network, the WINS client can remain enabled by default in bindings or be disabled as needed.In addition, where NetBIOS must be supported on the external network, activate the predefined NetBIOS filters for the following reasons: * Where the WINS client is enabled for the server's external network interface, activate the predefined "NetBIOS (WINS client only)" filter to provide secure filtering of NetBIOS traffic by Microsoft Proxy Server between the internal and external networks.* Where the WINS client is disabled for the server's external net- work interface, NetBIOS traffic is securely blocked from entering the internal network. This policy is in effect regard- less of whether NetBIOS predefined filters are activated. However, if the NetBIOS predefined filters are not activated, the packet filter driver will detect any NetBIOS broadcast packets on the external network that are received on the server's external adapter card as a possible attack on the proxy server. Consequently, it will log each of these packets and possibly generate an alert. This results in system overhead, and reduction in the usefulness of the logging & alerting features. To avoid this situation, you can activate the "NetBIOS (All)" predefined packet filter to stop logging of these NetBIOS packets when NetBIOS traffic is expected on the external network.WINSOCK PROXY DOMAIN FILTERS In the on-line documentation, under "Administration"-->"Setting Security Parameters"-->"Domain Filters", the following note is incorrect:
"To control WinSock Proxy access to Internet sites, create a filter for both the domain and the IP address of the site. When a WinSock application attempts to access an Internet site, it first converts the domain name to the IP address, and then tries to access the site by using the IP address. When the default filtering policy is set to "Denied", the filters (which allow access) must be created for both the domain name and IP address in order for access to that site to succeed."To control WinSock Proxy access to Internet sites, you only need to create a filter for the domain name. It is no longer necessary to create an additional domain filter for the IP address of an Internet site. ENABLING PASSIVE FTP FOR WEB PROXY FTP service can use two possible types of communication between the FTP server and its clients: passive FTP mode and non-passive FTP. Some FTP servers do not support both types. * How "non-passive"(or traditional) FTP works In "non-passive" FTP, the client connects to the server making a control channel. For each data operation, the client tells the server how to connect back to it, specifying the parameters for the data connection (data port, transfer mode, representation type, and structure). The server then uses these parameters to make the data channel. This type of FTP communication is the same as the model for FTP specified in the Internet standard draft for FTP (RFC 959) and has been traditionally used on all TCP/IP networks in the past. "Non-passive" FTP is required for all FTP service implementations and is by default the mode of FTP communication used by the Web Proxy service in Microsoft Proxy Server versions 1.0 and 2.0. * How Passive FTP differs from "Non-passive" FTP Passive FTP differs from "non-passive" FTP in that the client is responsible for making all connections with server, including the initial connecting request and subsequent data channel connections. In this way, passive FTP provides some additional security to the client against malicious attack by an FTP server. Because passive FTP is used on some recently implemented FTP servers on the Internet, Microsoft Proxy Server 2.0 provides support through the Windows NT Registry to enable the Web Proxy service to use passive FTP mode if it is needed. You may also need to support passive FTP for the following reasons: * You are using a firewall that cannot allow an inbound connection from the FTP server.* You are using third-party FTP applications. Some applications are simpler to configure where passive FTP is used.To enable Web Proxy support for passive FTP mode, the following reg- istry key can be modified. The entry name, data type, and supported values are as follows: * NonPassiveFTPTransfer is type REG_DWORD. The default value for this entry is 1, which uses Sendport (or "non-passive") FTP as the default transfer mode for FTP proxy.If the entry is changed to 0, the Web Proxy service will support FTP proxy with servers that use passive FTP mode. Otherwise, the value should be left to its default value of 1. This entry is installed by Microsoft Proxy Server to the following Windows NT Registry key path: HKEY_LOCALMACHINE\SYSTEM \CurrentControlSet \Services \W3proxy \ParametersYou should exercise caution when making any changes to the Windows NT Registry. Note: Passive FTP support is not an issue for the WinSock Proxy service which supports both passive and "non-passive" modes of FTP. SERVER PROXY ISSUES FOR USING EXCHANGE AND DNS Server proxy allows you to place a server, such as Microsoft Exchange Server using the Internet Mail Connector (IMC) on your private network behind Microsoft Proxy Server. With this configuration, an Exchange Server can provide Internet mail service by using the WinSock Proxy client and relying on features of Proxy Server 2.0 for protection. In addition, the Exchange Server computer will not require an additional registered Internet IP address. * How Server Proxy Works The WinSock Proxy Client allows you to bind services or applications to the external network interface of the server computer running Microsoft Proxy Server. Once a service or application is bound on the external network interface, it is then available to hosts on the Internet. The proxy server will then "listen" for connections on behalf of the service or application. For example, if you bind an internal SMTP/POP mail server to the proxy server, mail clients or SMTP servers on the Internet would be able to contact this mail server by connecting to the proxy server's Internet IP address. To remote computers on the Internet, these services will appear to be running on the proxy server computer. * Setting Up Server Proxy for Exchange Server >>>To set up server proxy for Exchange Server 5.0:
*.Exe file is installed. Note: Since Exchange Server has more than one .exe file for Inter- net mail and each EXE needs to be bound to the proxy, more than one Wspcfg.ini file will be needed.4. Create a Wspcfg.ini file for use with the Exchange SMTP service. Add the information below to Wspcfg.ini and place this file in the directory where Msexcimc.exe is located. [MSEXCIMC] ServerBindTcpPorts=25 Persistent=1 KillOldSession=1 Note: The SMTP port (25) on the Exchange Server will then be bound to the proxy server's port 25.5. Create a second Wspcfg.ini file for the Exchange store (Store.exe). Add the information below to this Wspcfg.ini and place the file in the directory where Store.exe is located. [STORE] ServerBindTcpPorts=110,119,143 Persistent=1 KillOldSession=1 Note: Additional ports, such as ports 119 and 143 shown above, can be listed since Store.exe provides Network News Transfer Protocol (NNTP) on port 119, POP mail on port 110, etc.6. If dynamic packet filtering is enabled (recommended), the proxy server will dynamically open all necessary ports when they are requested. No special configuration is needed.7. Stop and start the Exchange services or reboot the Exchange Server for the new settings to take effect.8. You should now be able to contact the Exchange server by connect- ing to the proxy server's Internet IP address using SMTP, NNTP, or POP. * Configuring DNS for Server Proxy with Exchange Server servers on the Internet refer to the IP address for the proxy server's external network adapter and not the internal IP address of the Exchange Server or SMTP server itself. For example, if your registered Internet domain name is "mydomain.com", and your internal Exchange server uses a DNS host name of "exchange1", you would need to use an MX, or mail ex- changer, record to provide other Internet hosts the name of your internal Exchange server. In this case, an MX record added in the "mydomain.com" zone could provide this information as follows: mydomain.com IN MX 10 exchange1.mydomain.com You would then need to create an A, or address, record for "exchange1.mydomain.com" that uses an external IP address of the proxy server. If the external IP address of your proxy server were 127.34.56.89, you would add the following A record to the "mydomain.com" zone: exchange1.mydomain.com IN A 127.34.56.89 In addition, you can add or create a PTR, or pointer, record to the "mydomain.com" zone to provide reverse lookup. A valid PTR record to do this would be: 89.56.34.127.in-addr.arpa IN PTR exchange1.mydomain.com2. The Exchange/SMTP server computer must be configured to resolve external (Internet) names by directly accessing an 'external' DNS server. Specify a DNS server on the DNS server search listing of your Exchange/SMTP server computer that can resolve Internet DNS addresses. This DNS server can be a server located on your network, located on your Proxy Server gateway computer, or located externally on the Internet. The IP address of this DNS server must be listed on the same machine running Exchange Server that is used to route mail from your network to the Internet. You may assign the DNS server's IP address to the Exchange Server using either static or dynamic assignment. For static assignment, set the IP address by adding it to "DNS Service Search Order" in TCP/IP Protocol Properties. For dynamic assignment, configure your DHCP server to provide this address by way of the standard DHCP assigned option code 6 (DNS Server List) to your Exchange Server machine. (Note: if your Exchange Server uses DHCP to obtain its IP address, you should reserve this address with the DHCP server for permanent assignment to the Exchange Server computer.)PACKET FILTERING SLOWS PERFORMANCE IF SERVER USES IDENTD If packet filtering is enabled, outbound access to servers (SMTP, FTP, IRC, etc.) can suffer slow performance if the remote server on the external network is running the Identification protocol (Identd) service. To correct performance problems in this situation, activate the pre- defined "Identd" packet filter on Microsoft Proxy Server. ADDITONAL NOTES ON CONFIGURING PACKET FILTERS The "Local Host" selection box in Packet Filter properties is used to select the local host computer that will exchange packets with a remote host computer. When configuring the "Local Host" selection box in the Packet Filter properties dialog box, please note the following: * To allow any IP address assigned to an external interface of the Proxy Server computer to exchange packets, click "Specific Proxy IP" and enter 0.0.0.0 for the IP address.* Also, if the "Internal computer" field in the same dialog is selected, the IP address entered in this field should be excluded from the proxy server's Local Address Table (LAT). For more information on how to change the LAT, see "Administration" -->"Setting Server Parameters"-->"Changing the LAT" in the on-line documentation.ADMINISTERING ARRAYS You should only administer one member of an array at a time. This ensures that array synchronization performs correctly and is simpler from an administrative standpoint. REGISTRY ENTRIES FOR ARRAYS There are two registry keys for Proxy Server that you can create that are not documented. These keys can be used to change the default ping timeout value and the number of communication attempts used in an array. The entry names, data types, and default values are as follows: * MaxPingTries is type REG_DWORD. The default value when this entry is absent is 3.* PingTimeout is type REG_DWORD. The default value when this entry is absent is 500 (milliseconds).You can create these entries using the Registry Editor. The entries must be installed to the following Windows NT Registry key path: HKEY_LOCALMACHINE\SYSTEM \CurrentControlSet \Services \Mspadmin \ParametersYou should exercise caution when making any changes to the Windows NT Registry. REGISTRY ENTRY FOR DISABLING SOCKS PROXY The following registry key can be modified for Microsoft Proxy Server to disable the Socks Proxy service if Socks service is not used on your network. The entry name, data type, and supported values are as follows: * SocksServiceEnabled is type REG_DWORD. The default value for this entry is 1, which is enabled. A value of 0 indicates the service is disabled.If the entry is changed to 0, the Socks Proxy service is fully dis- abled on the server computer. Microsoft Proxy Server will not start the Socks Proxy service automatically at system boot. Also, the service cannot be started manually using Microsoft Proxy Server ad- ministrative tools (such as Internet Service Manager or Remotmsp.exe) until the value is reset to a value of 1. This entry is installed by Microsoft Proxy Server to the following Windows NT Registry key path: HKEY_LOCALMACHINE\SYSTEM \CurrentControlSet \Services \W3proxy \Parameters \SocksYou should exercise caution when making any changes to the Windows NT Registry. REMOTE USE OF SYSTEM SERVICES WITH WINSOCK PROXY In general, most Windows NT system services are disabled from remote use by WinSock Proxy when Microsoft Proxy Server is installed. If you are attempting to proxy a system service application, you may have problems establishing a remote WinSock Proxy connection if the service was started prior to the NtLmSsp service during system boot. If you are attempting to use a Windows NT system service to access the Internet or another external network, be sure that the NtLmSsp service is started first. You may either adjust the order in which the service starts automatically during system boot to start after the NtLmSsp service has started, or manually start the service after the boot process is complete and the NtLmSsp service has already started. Another solution is to use the SC.EXE utility included in the Windows NT Resource Kit to make the service that you want 'remoted' be dependent on the NtLmSsp service: To create a service dependency, use the following command: SC \\MyMchineName CONFIG MyServiceName DEPEND= ntlmssp (don't omit the space after the =) To query a service dependency: SC \\MyMachineName QC MyServiceName SETTING AUTODISCONNECT FOR AUTO DIAL When using either Remote Access Service (RAS) or Routing and Remote Access Service (RRAS) for automated dial-up with Auto Dial, the following procedure should be used for applying dial-up connection settings that determine when a connection automatically disconnects after remaining idle. To set autodisconnect properly for a RAS or RRAS phonebook entry:
Dial connection by Microsoft Proxy Server. (Note: each section in the phonebook file has a separate heading in the form of [Phonebook Entry].)3. Find the value for "IdleDisconnectSeconds". In most cases, the value is typically set to 0. Increase the value to a number of seconds of your choosing that will be used to timeout and automatically disconnect if the line remains idle.4. Check to see if an option for "OverridePref" is included in the dialing entry section. If this option exists, set the value to 4. (Note: if this value does not exist, do not add it.)5. Save the file, Rasphone.pbk, and close your text editor application.Note: There is no need to reboot after applying the previous changes. RAS or RRAS will use your revised settings the next time dialing occurs. In general, it is recommended that you disable WINS client bindings for the dial-up adapter when using Auto Dial with Microsoft Proxy Server. If you require the use of NetBIOS on the dial-up adapter and decide not to disable bindings on the dial-up adapter for WINS client, you will also need to stop the computer's Browser service. To stop the Browser service, use the following two commands: NET STOP BROWSER NET CONFIG SRV /HIDDEN Also, you will need to disable the Computer Browser to prevent the service from restarting when the computer is rebooted. To disable the Computer Browser service:
WEB BROWSERS THAT SUPPORT SOCKS V4.3 DO NOT PROXY DNS LOOKUPS In the on-line documentation, under "Administration"-->"Administering Clients"-->"Configuring Web Proxy Client Applications", the following note text is incorrect: "Note: The Socks Proxy service supports the SOCKS 4.3a standard, which specifies name resolution. Web browsers do not use this feature. They require instead that name resolution of Internet addresses is avail- able on the client computer. If you are running a Web browser as a Socks client on a non-Windows client platform, you need to provide a DNS proxy server to your clients for name resolution. The DNS proxy server resolves names by forwarding client requests to a server on the Internet." It should be corrected to read: "The Socks Proxy service supports the SOCKS 4.3a standard, which specifies name resolution. Many Web browsers, including Microsoft Internet Explorer 3.02 and 4.0 and Netscape Navigator 3.0 do not use this feature. Instead, these browser applications, when configured to use a Socks server, require that DNS name resolution of Internet addresses be available on the client computer." "If you are running one of these Web browser applications as a Socks client on a non-Windows client platform, you need to provide a DNS server for these clients to use for their resolution of external DNS names. In this situation, there are two possible methods for implementing DNS service for these clients:" "1) Install a DNS server, such as Microsoft DNS Server, on the proxy server computer. You can then configure TCP/IP or DNS properties on your Socks client machines to point at the internal IP address of the proxy server as one of the their listed DNS servers. This is the recommended configuration for providing DNS service to Socks clients on your internal network.""2) As an alternative, you may point Socks clients towards a DNS server on your internal network that has been enabled to provide forwarding to the Internet for DNS name resolution. This config- uration is not recommended as it requires that Microsoft Proxy Client software first be installed on your internal DNS server, and may require additional reconfiguration of your internal DNS server to use forwarding to an external DNS server on the Inter- net."USING ROUTING AND REMOTE ACCESS SERVICE (RRAS) Routing and Remote Access Service (RRAS) can be used along with Micro- soft Proxy Server to provide a secure enterprise internetworking solution.
>>> Required RRAS hotfix In order to run RRAS and Proxy Server v2.0 on the same computer, you must install a required RRAS hotfix. This hotfix resolves issues associated with reliable, secure, integration between RRAS and Proxy.
In order to run RRAS and Proxy Server v2.0 on the same computer, you must install a required RRAS hotfix. This hotfix resolves issues associated with reliable, secure, integration between RRAS and Proxy. To download the corrected file connect to: http://www.microsoft.com/proxy/fix/rras_0.htm
>>> Recommended configurations This section addresses several common configurations and outlines recommended configurations for interworking both RRAS and MSP 2.0 on your network. * Departmental server running RRAS and MSP 2.0 A departmental server on an internal network (typically with only one network interface) should have packet filtering turned off. * Edge server connecting to the Internet running RRAS and MSP 2.0 This configuration involves the MSP 2.0 server computer using either two network adapters (one for internal interface, one for the external interface). For the internal interface, a network adapter card is needed. For the external interface, either a network adapter card or a modem can be used. An edge server in this configuration should have MSP packet filtering turned on with MSP 2.0 predefined packet filters activated with no additional custom packet filters configured. * Edge server with "Extranet" or barrier LAN segment An edge server in this configuration requires a third network adapter to be installed on the MSP 2.0 server computer to interface to the Extranet LAN segment (sometimes referred to as a DMZ network). The Local Address Table (LAT) on the server must not include IP addresses used on the Extranet LAN. Typically, routing is enabled between the external network and the Extranet LAN, and computers on the Extranet network with registered IP addresses can communicate directly with Internet computers. RRAS can be used to configure routing for each Interface. All communication between the Extranet LAN and the internal network should be done using Microsoft Proxy Server services (Web Proxy, WinSock Proxy, Socks Proxy). Where this configuration is applied, WinSock servers can also be remoted by means of configuration in the Wspcfg.ini file using application-specific settings. For more information on configuring these settings, see "Administration"-->"Administering Clients"-->"Configuring WinSock Proxy Client Applications" in the on-line documentation. Note: As an alternative, you can use RRAS instead for communication between the internal LAN and the Extranet LAN segments. This can be done by way of "Enabling IP Forwarding", eliminating the need to use MSP 2.0 services for proxy communication. However, this configuration is not preferred. Logging to an Access Database In the on-line documentation, under "Administration"-->"Configuring Logs"-->"Logging to a Database", there is an error in the description of creating an Access Table. Here are the updated instructions:
Creating an Access Database Table You can use the database template files, Msp.sql and Pf.sql, to create a database table in Microsoft SQL Server or Microsoft Access. In order to create a database table in Microsoft Access using a database template file, implement the following procedure:
Proxy Server logging. click "OK." sent in "Query." in Notepad in "Query", click "Save" and then click "OK." message boxes. Rename the Access table to use it with a particular Proxy Server service. ACKNOWLEDGMENTS Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Microsoft. Permission to print one copy for personal use is hereby granted if your only means of access is electronic. Microsoft may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. The furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property rights except as expressly provided in any written license agreement from Microsoft. (c)1997 Microsoft Corporation. All rights reserved. Microsoft, MS, Windows, and Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners.
|
Additional query words: readme .txt
© 1998 Microsoft Corporation. All rights reserved. Terms of Use. |