CART

(0) items

Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion,9780735626386

Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion

by ; ;
Edition:
1st
ISBN13:

9780735626386

ISBN10:
0735626383
Format:
Paperback
Pub. Date:
2/10/2010
Publisher(s):
Microsoft Press
List Price: $59.99

eBook


 
Duration
Price
$57.59

Rent Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

New Book

We're Sorry
Sold Out

More New and Used
from Private Sellers
Starting at $4.24
See Prices

Summary

The comprehensive, one-volume guide to deploying and managing Microsoft Forefrint TMG for Wec security, newtwork perimeter security, and application security.

Author Biography

Yuri Diogenes is a Microsoft senior support escalation engineer specializing in Forefront Edge Security. He is coauthor of the Forefront Community Site “Tales from the Edge”, writes Forefront security articles for Microsoft TechNet Magazine, and is a primary contributor to the Microsoft ISA Server Team Blog. Before joining Microsoft, Yuri was a network advisor for a Microsoft Gold Partner and taught Network and Operating System disciplines at the University in Brazil. Jim Harrison is a program manager on the Microsoft Forefront Edge Security Team who also designs integrated security solutions for Microsoft extranets and intranets. He is the coauthor of Microsoft’s Forefront Community Page “Tales from the Edge”. Jim is a former tester on the Microsoft ISA Server Sustained Engineering Team, and prior to that, served as an electronics technician for the US Navy. Mohit Saxena is a senior technical lead on the Microsoft Forefront Edge Security Team. He advises Microsoft Support Escalation Engineers on Forefront Edge Security support issues, bugs, and design changes. Technical Reviewer Dr. Thomas W. Shinder, MCSE, is a Microsoft MVP for Forefront Edge Security, the author of six highly regarded books on Microsoft ISA Server, and the administrator of the largest community of ISA and TMG firewall administrators on the Internet, with over 500 articles on the ISA and TMG firewalls and over 50,000 registered users. He has worked as a technology trainer, writer, and consultant since 1996, and has provided consultative security guidance to Fortune 500 companies.

Table of Contents

  • Foreword
  • Acknowledgments
  • Introduction
  • Part I: A New Era for the Microsoft Firewall
    • Chapter 1: What's New in TMG
    • Chapter 2: What Are the Differences Between TMG and UAG?
  • Part II: Planning for TMG
    • Chapter 3: System Requirements
    • Chapter 4: Analyzing Network Requirements
    • Chapter 5: Choosing the Right Network Topology
    • Chapter 6: Migrating to TMG
    • Chapter 7: Choosing a TMG Client Type
  • Part III: Implementing a TMG Deployment
    • Chapter 8: Installing TMG
    • Chapter 9: Troubleshooting TMG Setup
    • Chapter 10: Exploring the TMG Console
  • Part IV: TMG as Your Firewall
    • Chapter 11: Configuring TMG Networks
    • Chapter 12: Understanding Access Rules
    • Chapter 13: Configuring Load-Balancing Capabilities
    • Chapter 14: Network Inspection System
  • Part V: TMG as Your Caching Proxy
    • Chapter 15: Web Proxy Auto Discovery for TMG
    • Chapter 16: Caching Concepts and Configuration
  • Part VI: TMG Client Protection
    • Chapter 17: Malware Inspection
    • Chapter 18: URL Filtering
    • Chapter 19: Enhancing E-Mail Protection
    • Chapter 20: HTTP and HTTPS Inspection
  • Part VII: TMG Publishing Scenarios
    • Chapter 21: Understanding Publishing Concepts
    • Chapter 22: Publishing Servers
    • Chapter 23: Publishing Microsoft Office SharePoint Server
    • Chapter 24: Publishing Exchange Server
  • Part VIII: Remote Access
    • Chapter 25: Understanding Remote Access
    • Chapter 26: Implementing Dial-in Client VPN
    • Chapter 27: Implementing Site-to-Site VPN
  • Part IX: Logging and Reporting
    • Chapter 28: Logging
    • Chapter 29: Enhanced NAT
    • Chapter 30: Scripting TMG
  • Part X: Troubleshooting
    • Chapter 31: Mastering the Art of Troubleshooting
    • Chapter 32: Exploring HTTP Protocol
    • Chapter 33: Using Network Monitor 3 for Troubleshooting TMG
  • From Proxy to TMG
  • TMG Performance Counters
  • Windows Internet Libraries
  • WPAD Script CARP Operation


Please wait while the item is added to your cart...