ISA Firewall Service Process (wspsrv.exe) high CPU utilization issue

1. Introduction   When dealing with ISA high CPU utilization where wspsrve.exe is the one consuming more resources, the first impression is that ISA is the culprit for that. There are some scenarios where this statement is true, such as this one that I documented last year. But there are other scenarios where this is…


How Disk Bottleneck can affect TMG Performance?

1. Introduction   Troubleshooting performance issue is not easy regardless of the product, with TMG being no different, matter fact it is tougher because there are so many other elements involved that are external to TMG, which can play a big role on the overall performance experience.    2. General Considerations   One of the…


New Articles for Tales from the Edge

We’re happy to announce publishing of two more articles on the Tales from the Edge community site:   Part 1 of a three-part series on using Network Monitor 3 to troubleshoot Firewall and TMG client traffic: Network Monitor 3.3 RWS Parser Basics, Part 1: Introduction to RWS Protocol Analysis   A description of Forefront TMG…


Forefront TMG 2010 Capacity Planning Tool Now Available

 The Forefront TMG 2010 Capacity Planning Tool, a Microsoft Excel spreadsheet with built-in workflow, is now available for download.   Forefront TMG now has two resources that can help you determine the server hardware required for your deployment:   ·         The TechNet article Forefront TMG 2010 hardware recommendations­—Shows hardware recommendations for common deployment scenarios, and…


Hardware recommendations for Forefront TMG 2010

In this post, we discuss the hardware recommendations for Forefront TMG, based on the number of users and deployment scenario. Enabling different features on Forefront TMG carries different costs. When considering the hardware required for your deployment, take into account the projected growth of your organization and the Internet’s increasing bandwidth demands. The recommendations that…


Reducing Kerberos requests when using KCD for web publishing.

1. Introduction If you have read the article “Kerberos Constrained Delegation in ISA Server 2006” http://technet.microsoft.com/en-us/library/bb794858.aspx and followed the instructions how to publish a web server by using Kerberos Constrained Delegation, you might expect that the Kerberos authentication requests should be quite low as Kerberos uses tickets. You might also expect that those tickets will…


High CPU Utilization by Wspsrv.exe Process

1. Introduction   The Firewall service is ISA Server’s   main user mode service; it runs with the Network Account credentials and under the context of the process wspsrv.exe. The CPU utilization of this process might vary according to the server load and other external elements, for example: antivirus, third party plug ins, etc.   Note:…