O'Reilly logo

Thor's Microsoft Security Bible by Timothy Thor Mullen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1. Securely Writing Web Proxy Log Data to SQL Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into TMG
Information in this chapter:
▪ Implementation
▪ Securely Logging Data to SQL
▪ Designing the Workflow
▪ Execution
Products, Tools, and Methods:
▪ Active Directory (AD)
▪ MS SQL Server
▪ Internet Security and Acceleration (ISA) Server/TMG1 Windows Firewall with Advanced Security
1From this point forward, only TMG will be discussed, though many options may be used in ISA Server as well.
▪ TMG Logging to SQL Server
▪ Least Privilege Service User
▪ SQL Common Language Runtime (CLR) to Replace xp_cmdshell
▪ AD Permissions Delegation
▪ Organizational Units
▪ TMG Deny Rules
▪ Computer Certificates

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required