O'Reilly logo

Microsoft Forefront UAG 2010 Administrator's Handbook by Ran Dolev, Erez Ben-Ari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Configuring restricted zone settings

As we said earlier, the Restricted-Zone policy allows you to have a tighter security for certain parts of an application. In the next chapter, we will discuss the access rules that you can configure on the advanced trunk configuration, which allow you to completely block access to certain URLs with a high level of granularity, but using the restricted-zone feature can be more useful for situations where an application has certain areas that perform actions that may be considered to be more invasive or dangerous.

For example, when using Outlook Web Access, users may use the Options button to configure things like an out-of-office message, create rules, and change their password. Clicking this button in OWA 2010 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required