Microsoft Forefront(TM) Threat Management Gateway (TMG) Administrator's Companion

Overview

Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for ...

See more details below
Other sellers (Paperback)
  • All (24) from $18.51   
  • New (14) from $25.04   
  • Used (10) from $18.51   
Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion

Available on NOOK devices and apps  
  • NOOK Devices
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK Study
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$27.49
BN.com price
(Save 42%)$47.99 List Price

Overview

Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to:

  • Implement TMG
  • integrated security features
  • Analyze your Web and perimeter security requirements and infrastructure
  • Plan, install, and configure TMG
  • Implement network intrusion prevention, proxy, caching, filtering
  • Configure security for the Web, Microsoft Exchange Server, and SharePoint Products and Technologies
  • Implement remote access and site-to-site VPNs
  • Select and configure clients
  • Monitor and troubleshoot protected systems with Network Monitor 3 and other tools
  • Use scripting to configure systems and automate administration
  • Plus, get a fully searchable eBook on the companion CD

For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

Read More Show Less

Product Details

  • ISBN-13: 9780735626386
  • Publisher: Microsoft Press
  • Publication date: 2/23/2010
  • Pages: 1056
  • Sales rank: 661,432
  • Product dimensions: 7.30 (w) x 8.90 (h) x 1.80 (d)

Meet the Author

Jim Harrison is a program manager on the Microsoft Forefront Edge Security Team who also designs integrated security solutions for Microsoft extranets and intranets. He is the coauthor of Microsoft's Forefront Community Page "Tales from the Edge". Jim is a former tester on the Microsoft ISA Server Sustained Engineering Team, and prior to that, served as an electronics technician for the US Navy.

Read More Show Less

Table of Contents

  • Foreword
  • Acknowledgments
  • Introduction
  • Part I: A New Era for the Microsoft Firewall
    • Chapter 1: What's New in TMG
    • Chapter 2: What Are the Differences Between TMG and UAG?
  • Part II: Planning for TMG
    • Chapter 3: System Requirements
    • Chapter 4: Analyzing Network Requirements
    • Chapter 5: Choosing the Right Network Topology
    • Chapter 6: Migrating to TMG
    • Chapter 7: Choosing a TMG Client Type
  • Part III: Implementing a TMG Deployment
    • Chapter 8: Installing TMG
    • Chapter 9: Troubleshooting TMG Setup
    • Chapter 10: Exploring the TMG Console
  • Part IV: TMG as Your Firewall
    • Chapter 11: Configuring TMG Networks
    • Chapter 12: Understanding Access Rules
    • Chapter 13: Configuring Load-Balancing Capabilities
    • Chapter 14: Network Inspection System
  • Part V: TMG as Your Caching Proxy
    • Chapter 15: Web Proxy Auto Discovery for TMG
    • Chapter 16: Caching Concepts and Configuration
  • Part VI: TMG Client Protection
    • Chapter 17: Malware Inspection
    • Chapter 18: URL Filtering
    • Chapter 19: Enhancing E-Mail Protection
    • Chapter 20: HTTP and HTTPS Inspection
  • Part VII: TMG Publishing Scenarios
    • Chapter 21: Understanding Publishing Concepts
    • Chapter 22: Publishing Servers
    • Chapter 23: Publishing Microsoft Office SharePoint Server
    • Chapter 24: Publishing Exchange Server
  • Part VIII: Remote Access
    • Chapter 25: Understanding Remote Access
    • Chapter 26: Implementing Dial-in Client VPN
    • Chapter 27: Implementing Site-to-Site VPN
  • Part IX: Logging and Reporting
    • Chapter 28: Logging
    • Chapter 29: Enhanced NAT
    • Chapter 30: Scripting TMG
  • Part X: Troubleshooting
    • Chapter 31: Mastering the Art of Troubleshooting
    • Chapter 32: Exploring HTTP Protocol
    • Chapter 33: Using Network Monitor 3 for Troubleshooting TMG
  • From Proxy to TMG
  • TMG Performance Counters
  • Windows Internet Libraries
  • WPAD Script CARP Operation
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted November 7, 2011

    No text was provided for this review.

Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)