Understanding Malware Inspection in TMG 427
Configuring Malware Inspection 431
Creating Reports with Malware Statistics 446
Chapter 1 gave you a detailed breakdown of the traffic flow through the Malware and the Web Proxy filters. What you'll gain in this chapter is a functional understanding of the malware inspection options and their impact on TMG behavior as well as the user experience created by those selections.
As more ne'er-do-wells and miscreants try to gain access to our wallets, medical histories, and financial resources through attacks on Web sites; and as the malware they create in support of their nefarious deeds grows ever more prevalent; and as more users ...