Book description
Get your Web security, network perimeter security, and
application layer security gateway up and running smoothly. This
indispensible, single-volume reference details the features and
capabilities of Microsoft Forefront Threat Management Gateway
(TMG). You'll gain the real-world insights, implementation and
configuration best practices, and management practices you need for
on-the-job results. Discover how to:
Implement TMG
integrated security features
Analyze your Web and perimeter security requirements and infrastructure
Plan, install, and configure TMG
Implement network intrusion prevention, proxy, caching, filtering
Configure security for the Web, Microsoft Exchange Server, and SharePoint Products and Technologies
Implement remote access and site-to-site VPNs
Select and configure clients
Monitor and troubleshoot protected systems with Network Monitor 3 and other tools
Use scripting to configure systems and automate administration
Plus, get a fully searchable eBook on the companion CD
For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
Table of contents
- Foreword
- Acknowledgments
-
Introduction
- The Target Audience
-
Organization and Usage
- Part 1 A New Era for the Microsoft Firewall
- Part 2 Planning for TMG
- Part 3 Implementing a TMG Deployment
- Part 4 TMG as Your Firewall
- Part 5 TMG as Your Caching Proxy
- Part 6 TMG Client Protection
- Part 7 TMG Publishing Scenarios
- Part 8 Remote Access
- Part 9 Logging and Reporting
- Part 10 Troubleshooting
- Appendices
- Terminology
- Companion CD
- System Requirements
- Feedback and Support for This Book
-
I. A New Era for the Microsoft Firewall
-
1. What’s New in TMG
- Introducing TMG
- Beyond the Firewall
-
What’s New?
- Windows Server 2008, Windows Server 2008 R2, and Native 64-Bit Support
- Web Antivirus and Anti-Malware Support
- Enhanced User Interface, Management, and Reporting
- URL Filtering
- HTTPS Inspection
- E-Mail Anti-Malware and Anti-Spam Support
- Network Intrusion Prevention
- The Session Initiation Protocol (SIP) Filter
- TFTP Filter
- Network Functionality Enhancements
- Feature Comparison Summary
- Summary
- 2. What Are the Differences Between TMG and UAG?
-
1. What’s New in TMG
-
II. Planning for TMG
- 3. System Requirements
- 4. Analyzing Network Requirements
- 5. Choosing the Right Network Topology
- 6. Migrating to TMG
- 7. Choosing a TMG Client Type
-
III. Implementing a TMG Deployment
- 8. Installing TMG
- 9. Troubleshooting TMG Setup
-
10. Exploring the TMG Console
- TMG Medium Business Edition
- Updates for TMG 2010
-
New Wizards
- The Getting Started Wizard
- The Network Setup Wizard
- The System Configuration Wizard
- The Deployment Wizard
- The Web Access Policy Wizard
- The Join Array and Disjoin Array Wizards (TMG 2010 only)
- The Connect to Forefront Protection Manager 2010 Wizard (TMG 2010 only)
- The Configure SIP Wizard (TMG 2010 only)
- The Configure E-Mail Policy Wizard (TMG 2010 only)
- The Enable ISP Redundancy Wizard (TMG 2010 only)
- Summary
-
IV. TMG as Your Firewall
- 11. Configuring TMG Networks
- 12. Understanding Access Rules
- 13. Configuring Load-Balancing Capabilities
- 14. Network Inspection System
-
V. TMG as Your Caching Proxy
-
15. Web Proxy Auto Discovery for TMG
- WPAD as Protocol and Script
- Configuring Automatic Discovery in the Network
- Configuring Client Applications
- Summary
- 16. Caching Concepts and Configuration
-
15. Web Proxy Auto Discovery for TMG
-
VI. TMG Client Protection
- 17. Malware Inspection
- 18. URL Filtering
- 19. Enhancing E-Mail Protection
- 20. HTTP and HTTPS Inspection
-
VII. TMG Publishing Scenarios
- 21. Understanding Publishing Concepts
- 22. Publishing Servers
- 23. Publishing Microsoft Office SharePoint Server
- 24. Publishing Exchange Server
-
VIII. Remote Access
- 25. Understanding Remote Access
- 26. Implementing Dial-in Client VPN
- 27. Implementing Site-to-Site VPN
- IX. Logging and Reporting
-
X. Troubleshooting
- 31. Mastering the Art of Troubleshooting
- 32. Exploring HTTP Protocol
- 33. Using Network Monitor 3 for Troubleshooting TMG
-
A. From Proxy to TMG
- Understanding the HTTP Protocol
- Understanding Proxy Servers
-
The History Behind TMG
- Proxy Server 1.0
- Proxy Server 2.0
- Internet Security and Acceleration (ISA) Server 2000
- Internet Security and Acceleration (ISA) Server 2000 Feature Pack 1
- Internet Security and Acceleration (ISA) Server 2004
- Internet Security and Acceleration (ISA) Server 2004 Service Pack 2
- Internet Security and Acceleration (ISA) Server 2004 Service Pack 3
- Internet Security and Acceleration (ISA) Server 2006
- Internet Security and Acceleration (ISA) Server 2006 Supportability Update
- Internet Security and Acceleration (ISA) Server 2006 Service Pack 1
- Forefront TMG Medium Business Edition
-
B. TMG Performance Counters
-
TMG Performance Counters
- Firewall Packet Engine Performance Counters
- H.323 Filter Performance Counters
- Cache Performance Counters
- Microsoft Firewall Service Performance Counters
- SOCKS Filter Performance Counter
- Performance Counters
- Compression Performance Counters
- Diffserv Performance Counters
- Malware Protection Performance Counters
- HTTPS Performance Counters
- E-mail Hygiene Performance Counters
- URL Filtering Performance Counters
- TMG Performance Monitor
- System Performance
- How to Use These Counters
- Summary
-
TMG Performance Counters
- C. Windows Internet Libraries
- D. WPAD Script CARP Operation
- Index
- About the Authors
- Copyright
Product information
- Title: Microsoft® Forefront® Threat Management Gateway (TMG) Administrator’s Companion
- Author(s):
- Release date: February 2010
- Publisher(s): Microsoft Press
- ISBN: 9780735640535
You might also like
book
Deploying Microsoft® Forefront® Threat Management Gateway 2010
Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) …
book
Microsoft® Windows® 2000 Security Handbook
Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing …
book
The Complete Guide to Windows Server 2008
“This book is an invaluable one-stop reference for deploying, configuring, and managing Windows Server 2008. It’s …
book
Windows Server 2008: The Definitive Guide
This practical guide has exactly what you need to work with Windows Server 2008. Inside, you'll …