Chapter 1. Securely Writing Web Proxy Log Data to SQL Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into TMG
Information in this chapter:
▪ Implementation
▪ Securely Logging Data to SQL
▪ Designing the Workflow
▪ Execution
Products, Tools, and Methods:
▪ Active Directory (AD)
▪ MS SQL Server
▪ Internet Security and Acceleration (ISA) Server/TMG1 Windows Firewall with Advanced Security
1From this point forward, only TMG will be discussed, though many options may be used in ISA Server as well.
▪ TMG Logging to SQL Server
▪ Least Privilege Service User
▪ SQL Common Language Runtime (CLR) to Replace xp_cmdshell
▪ AD Permissions Delegation
▪ Organizational Units
▪ TMG Deny Rules
▪ Computer Certificates
Get Thor's Microsoft Security Bible now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.