Microsoft Forefront(TM) Threat Management Gateway (TMG) Administrator's Companion

Overview

Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft® Forefront® Threat Management Gateway (TMG). You'll gain the ...

See more details below
Other sellers (Paperback)
  • All (19) from $2.71   
  • New (9) from $17.09   
  • Used (10) from $2.69   
Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$27.49
BN.com price
(Save 42%)$47.99 List Price

Overview

Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft® Forefront® Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to:

  • Implement TMG
  • integrated security features
  • Analyze your Web and perimeter security requirements and infrastructure
  • Plan, install, and configure TMG
  • Implement network intrusion prevention, proxy, caching, filtering
  • Configure security for the Web, Microsoft® Exchange Server, and SharePoint® Products and Technologies
  • Implement remote access and site-to-site VPNs
  • Select and configure clients
  • Monitor and troubleshoot protected systems with Network Monitor 3 and other tools
  • Use scripting to configure systems and automate administration
  • Plus, get a fully searchable eBook on the companion CD

A Note Regarding the CD or DVD

The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Read More Show Less

Product Details

  • ISBN-13: 9780735626386
  • Publisher: Microsoft Press
  • Publication date: 2/23/2010
  • Series: Admin Companion Series
  • Pages: 1056
  • Sales rank: 906,120
  • Product dimensions: 7.30 (w) x 8.90 (h) x 1.80 (d)

Meet the Author

Yuri Diogenes is a Microsoft senior support escalation engineer specializing in Forefront Edge Security. He is coauthor of the Forefront Community Site "Tales from the Edge", writes Forefront security articles for Microsoft TechNet Magazine, and is a primary contributor to the Microsoft ISA Server Team Blog. Before joining Microsoft, Yuri was a network advisor for a Microsoft Gold Partner and taught Network and Operating System disciplines at the University in Brazil.

Jim Harrison is a program manager on the Microsoft Forefront Edge Security Team who also designs integrated security solutions for Microsoft extranets and intranets. He is the coauthor of Microsoft's Forefront Community Page "Tales from the Edge". Jim is a former tester on the Microsoft ISA Server Sustained Engineering Team, and prior to that, served as an electronics technician for the US Navy.

Mohit Saxena is a senior technical lead on the Microsoft Forefront Edge Security Team. He advises Microsoft Support Escalation Engineers on Forefront Edge Security support issues, bugs, and design changes.

Read More Show Less

Table of Contents

Foreword;
Acknowledgments;
From "The Collective";
From Jim;
From Yuri;
From Mohit;
Introduction;
The Target Audience;
Organization and Usage;
Terminology;
Companion CD;
System Requirements;
Feedback and Support for This Book;
Part I: A New Era for the Microsoft Firewall;
Chapter 1: What's New in TMG;
1.1 Introducing TMG;
1.2 Beyond the Firewall;
1.3 What's New?;
1.4 Summary;
Chapter 2: What Are the Differences Between TMG and UAG?;
2.1 Enabling Anywhere Access;
2.2 Understanding IAG 2007;
2.3 IAG 2007 Integration with ISA Server 2006;
2.4 Forefront UAG: The Next Generation of IAG 2007;
2.5 What's New in UAG?;
2.6 Aligning UAG with Security Needs;
2.7 Designing Network Protection;
2.8 Summary;
Part II: Planning for TMG;
Chapter 3: System Requirements;
3.1 Hardware Requirements;
3.2 Software Requirements;
3.3 General Recommendations;
3.4 Deploying in Virtual Environments;
3.5 Summary;
Chapter 4: Analyzing Network Requirements;
4.1 Determining Your Traffic Profile;
4.2 TMG Deployment Options;
4.3 Addressing Complex Networks;
4.4 Configuring TMG Networks;
4.5 Understanding How Name Resolution Impacts TMG;
4.6 Summary;
Chapter 5: Choosing the Right Network Topology;
5.1 Choosing the Network Template;
5.2 Examining High Availability;
5.3 Joining the Firewall to a Domain or Workgroup;
5.4 Summary;
Chapter 6: Migrating to TMG;
6.1 General Considerations;
6.2 Scenarios;
6.3 Example Checklists;
6.4 Example Migration from ISA 2006 SE to TMG 2010 EE Forward Proxy Scenario;
6.5 Summary;
Chapter 7: Choosing a TMG Client Type;
7.1 Web Proxy Client;
7.2 SecureNET Client;
7.3 Forefront TMG Client;
7.4 Choosing the Right Client for Your Environment;
7.5 Summary;
Part III: Implementing a TMG Deployment;
Chapter 8: Installing TMG;
8.1 Final Considerations Before Installing TMG;
8.2 Installing TMG MBE;
8.3 Installing TMG 2010;
8.4 Summary;
Chapter 9: Troubleshooting TMG Setup;
9.1 Understanding Setup Architecture;
9.2 Setup Options;
9.3 What to Look for When Setup Fails;
9.4 Summary;
Chapter 10: Exploring the TMG Console;
10.1 TMG Medium Business Edition;
10.2 Updates for TMG 2010;
10.3 New Wizards;
10.4 Summary;
Part IV: TMG as Your Firewall;
Chapter 11: Configuring TMG Networks;
11.1 Understanding Network Relationships;
11.2 Creating Networks;
11.3 Configuring Your Protected Networks;
11.4 Summary;
Chapter 12: Understanding Access Rules;
12.1 Traffic Policy Behavior;
12.2 Understanding Policy Re-Evaluation;
12.3 Troubleshooting Access Rules;
12.4 Summary;
Chapter 13: Configuring Load-Balancing Capabilities;
13.1 Multiple Paths to the Internet;
13.2 Implementing ISP Redundancy;
13.3 Understanding and Implementing NLB;
13.4 Summary;
Chapter 14: Network Inspection System;
14.1 Understanding Network Inspection System;
14.2 Implementing Network Inspection System;
14.3 Implementing Intrusion Detection;
14.4 Summary;
Part V: TMG as Your Caching Proxy;
Chapter 15: Web Proxy Auto Discovery for TMG;
15.1 WPAD as Protocol and Script;
15.2 Configuring Automatic Discovery in the Network;
15.3 Configuring Client Applications;
15.4 Summary;
Chapter 16: Caching Concepts and Configuration;
16.1 Understanding Proxy Cache;
16.2 Configuring the Forefront TMG 2010 Cache;
16.3 Troubleshooting Cache;
16.4 Summary;
Part VI: TMG Client Protection;
Chapter 17: Malware Inspection;
17.1 Understanding Malware Inspection in TMG;
17.2 Configuring Malware Inspection;
17.3 Creating Reports with Malware Statistics;
17.4 Summary;
Chapter 18: URL Filtering;
18.1 How URL Filtering Works;
18.2 Configuring URL Filtering;
18.3 Update Center;
18.4 Summary;
Chapter 19: Enhancing E-Mail Protection;
19.1 Understanding E-Mail Threats;
19.2 How SMTP Protection Works in TMG;
19.3 Configuring SMTP Protection on TMG;
19.4 Summary;
Chapter 20: HTTP and HTTPS Inspection;
20.1 The Web Proxy Application Filter;
20.2 Configuring HTTPS Inspection;
20.3 Configuring the HTTP Filter;
20.4 Summary;
Part VII: TMG Publishing Scenarios;
Chapter 21: Understanding Publishing Concepts;
21.1 Core Publishing Scenarios;
21.2 Publishing Rule Elements;
21.3 Planning Publishing Rules;
21.4 Summary;
Chapter 22: Publishing Servers;
22.1 How to Publish a Web Server;
22.2 Publishing a Non-Web Server;
22.3 Troubleshooting Publishing Rules;
22.4 Summary;
Chapter 23: Publishing Microsoft Office SharePoint Server;
23.1 Planning to Publish SharePoint;
23.2 Configuring SharePoint Publishing;
23.3 Troubleshooting;
23.4 Summary;
Chapter 24: Publishing Exchange Server;
24.1 Planning;
24.2 Configuring Exchange Client Access through Forefront TMG;
24.3 Troubleshooting;
24.4 Summary;
Part VIII: Remote Access;
Chapter 25: Understanding Remote Access;
25.1 Understanding VPN Concepts;
25.2 Planning VPN Access;
25.3 NAP Integration;
25.4 Summary;
Chapter 26: Implementing Dial-in Client VPN;
26.1 Configuring VPN Client Access;
26.2 Configure VPN Client Access with NAP Integration;
26.3 Configuring VPN Client Access Using SSTP;
26.4 Summary;
Chapter 27: Implementing Site-to-Site VPN;
27.1 Configuring L2TP Over IPsec Site-to-Site VPN;
27.2 Configuring PPTP Site-to-Site VPN;
27.3 Troubleshooting VPN Client Connections;
27.4 Summary;
Part IX: Logging and Reporting;
Chapter 28: Logging;
28.1 Why Logging Is Important;
28.2 Configuring TMG Logging;
28.3 Logging Best Practices;
28.4 Summary;
Chapter 29: Enhanced NAT;
29.1 Understanding Enhanced NAT;
29.2 Configuring Enhanced NAT;
29.3 Troubleshooting Enhanced NAT;
29.4 Summary;
Chapter 30: Scripting TMG;
30.1 Understanding the TMG Component Object Model (COM);
30.2 Administering TMG with VBScript or JScript;
30.3 Administering TMG with Windows PowerShell;
30.4 Summary;
Part X: Troubleshooting;
Chapter 31: Mastering the Art of Troubleshooting;
31.1 General Troubleshooting Methodology;
31.2 Troubleshooting Tools;
31.3 Putting It All Together;
31.4 Summary;
Chapter 32: Exploring HTTP Protocol;
32.1 Understanding the HTTP Protocol;
32.2 How HTTP Authentication Works;
32.3 Understanding HTTPS;
32.4 Summary;
Chapter 33: Using Network Monitor 3 for Troubleshooting TMG;
33.1 Using Network Monitor to Capture Traffic;
33.2 Data Gathering with Network Monitor;
33.3 Reading a Network Monitor Capture;
33.4 Troubleshooting TMG Using Network Monitor;
33.5 Summary;
From Proxy to TMG;
Understanding the HTTP Protocol;
Understanding Proxy Servers;
The History Behind TMG;
TMG Performance Counters;
TMG Performance Counters;
How to Use These Counters;
Summary;
Windows Internet Libraries;
WinHTTP vs. WinInet;
Autoproxy (WPAD);
Applications That Use WinHTTP;
Summary;
WPAD Script CARP Operation;
CARP Logic;
CARP Action Examples;
Summary;

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted November 7, 2011

    No text was provided for this review.

Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)