- Copyright 2010
- Dimensions: 7-3/8" x 9"
- Edition: 1st
-
eBook
- ISBN-10: 0-7356-4052-1
- ISBN-13: 978-0-7356-4052-8
Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to:
- Implement TMG
- integrated security features
- Analyze your Web and perimeter security requirements and infrastructure
- Plan, install, and configure TMG
- Implement network intrusion prevention, proxy, caching, filtering
- Configure security for the Web, Microsoft Exchange Server, and SharePoint Products and Technologies
- Implement remote access and site-to-site VPNs
- Select and configure clients
- Monitor and troubleshoot protected systems with Network Monitor 3 and other tools
- Use scripting to configure systems and automate administration
- Plus, get a fully searchable eBook on the companion CD
For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
Table of Contents
- Foreword
- Acknowledgments
- Introduction
- Part I: A New Era for the Microsoft Firewall
- Chapter 1: What's New in TMG
- Chapter 2: What Are the Differences Between TMG and UAG?
- Part II: Planning for TMG
- Chapter 3: System Requirements
- Chapter 4: Analyzing Network Requirements
- Chapter 5: Choosing the Right Network Topology
- Chapter 6: Migrating to TMG
- Chapter 7: Choosing a TMG Client Type
- Part III: Implementing a TMG Deployment
- Chapter 8: Installing TMG
- Chapter 9: Troubleshooting TMG Setup
- Chapter 10: Exploring the TMG Console
- Part IV: TMG as Your Firewall
- Chapter 11: Configuring TMG Networks
- Chapter 12: Understanding Access Rules
- Chapter 13: Configuring Load-Balancing Capabilities
- Chapter 14: Network Inspection System
- Part V: TMG as Your Caching Proxy
- Chapter 15: Web Proxy Auto Discovery for TMG
- Chapter 16: Caching Concepts and Configuration
- Part VI: TMG Client Protection
- Chapter 17: Malware Inspection
- Chapter 18: URL Filtering
- Chapter 19: Enhancing E-Mail Protection
- Chapter 20: HTTP and HTTPS Inspection
- Part VII: TMG Publishing Scenarios
- Chapter 21: Understanding Publishing Concepts
- Chapter 22: Publishing Servers
- Chapter 23: Publishing Microsoft Office SharePoint Server
- Chapter 24: Publishing Exchange Server
- Part VIII: Remote Access
- Chapter 25: Understanding Remote Access
- Chapter 26: Implementing Dial-in Client VPN
- Chapter 27: Implementing Site-to-Site VPN
- Part IX: Logging and Reporting
- Chapter 28: Logging
- Chapter 29: Enhanced NAT
- Chapter 30: Scripting TMG
- Part X: Troubleshooting
- Chapter 31: Mastering the Art of Troubleshooting
- Chapter 32: Exploring HTTP Protocol
- Chapter 33: Using Network Monitor 3 for Troubleshooting TMG
- From Proxy to TMG
- TMG Performance Counters
- Windows Internet Libraries
- WPAD Script CARP Operation