O'Reilly logo

Thor's Microsoft Security Bible by Timothy Thor Mullen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation
Information in this chapter:
▪ Research and Due Diligence
▪ Implementing a Solution
▪ Integrating with TMG
Products, Tools, and Methods:
▪ MS SQL Server
▪ TMG
▪ Visual Studio (C#/Visual Basic for Applications)
▪ TMG Logging to SQL Server
▪ SQL CLR
▪ TMG Deny Rules
This chapter illustrates how to create database objects to represent every country's individual ranges of IP addresses, and how to use this data to create individual sets of TMG computer objects to use for rule sets.
Keywords: TMG, Geolocation, SQL, Blocking Malicious Traffic

Introduction

Years back, while working on a research project involving SQL Slammer and the persistence of vulnerable installations around the globe, I ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required