Apply changes one at a timeApplying changes individually allows for testing and verifying the proper operation of each change.
Teach monitoring skillsTrain individuals who will be acknowledging ISA alerts to know what to look for and to respond appropriately.
Always install the Firewall ClientUse the Firewall Client on client workstations to enable logging and advanced firewall access settings.
Use logs for troubleshootingThe information tracked in the ISA logs quickly points you to the element that may be causing access problems.
Reduce the space that ISA logs useBecause the log information collected by ISA for smaller organizations will be small, setting the maximum log size to a smaller value can save disk space needed for other server tools.
Limit client connectionsReducing the number of outbound client connections in ISA can help prevent network flooding and the spread of some Trojans.
When to set an even larger cacheIn organizations where users rely on a great deal of static web information, increasing the size of the cache may result in better performance.