Muutke küpsiste eelistusi

E-raamat: Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion

  • Formaat: EPUB+DRM
  • Ilmumisaeg: 10-Feb-2010
  • Kirjastus: Microsoft Press,U.S.
  • Keel: eng
  • ISBN-13: 9780735642829
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 21,45 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 10-Feb-2010
  • Kirjastus: Microsoft Press,U.S.
  • Keel: eng
  • ISBN-13: 9780735642829
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You’ll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results.

Discover how to:

• Implement TMG integrated security features

• Analyze your Web and perimeter security requirements and infrastructure

• Plan, install, and configure TMG• Implement network intrusion prevention, proxy, caching, filtering

• Configure security for the Web, Microsoft Exchange Server, and SharePoint Products and Technologies• Implement remote access and site-to-site VPNs

• Select and configure clients

• Monitor and troubleshoot protected systems with Network Monitor 3 and other tools

• Use scripting to configure systems and automate administration

• Plus, get a fully searchable eBook on the companion CD





Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to:

  • Implement TMG
  • integrated security features
  • Analyze your Web and perimeter security requirements and infrastructure
  • Plan, install, and configure TMG
  • Implement network intrusion prevention, proxy, caching, filtering
  • Configure security for the Web, Microsoft Exchange Server, and SharePoint Products and Technologies
  • Implement remote access and site-to-site VPNs
  • Select and configure clients
  • Monitor and troubleshoot protected systems with Network Monitor 3 and other tools
  • Use scripting to configure systems and automate administration
  • Plus, get a fully searchable eBook on the companion CD

For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

Foreword
Acknowledgments
Introduction
Part I: A New Era for the Microsoft Firewall

Chapter 1: What's New in TMG
Chapter 2: What Are the Differences Between TMG and UAG?


Part II: Planning for TMG

Chapter 3: System Requirements
Chapter 4: Analyzing Network Requirements
Chapter 5: Choosing the Right Network Topology
Chapter 6: Migrating to TMG
Chapter 7: Choosing a TMG Client Type


Part III: Implementing a TMG Deployment

Chapter 8: Installing TMG
Chapter 9: Troubleshooting TMG Setup
Chapter 10: Exploring the TMG Console


Part IV: TMG as Your Firewall

Chapter 11: Configuring TMG Networks
Chapter 12: Understanding Access Rules
Chapter 13: Configuring Load-Balancing Capabilities
Chapter 14: Network Inspection System


Part V: TMG as Your Caching Proxy

Chapter 15: Web Proxy Auto Discovery for TMG
Chapter 16: Caching Concepts and Configuration


Part VI: TMG Client Protection

Chapter 17: Malware Inspection
Chapter 18: URL Filtering
Chapter 19: Enhancing E-Mail Protection
Chapter 20: HTTP and HTTPS Inspection


Part VII: TMG Publishing Scenarios

Chapter 21: Understanding Publishing Concepts
Chapter 22: Publishing Servers
Chapter 23: Publishing Microsoft Office SharePoint Server
Chapter 24: Publishing Exchange Server


Part VIII: Remote Access

Chapter 25: Understanding Remote Access
Chapter 26: Implementing Dial-in Client VPN
Chapter 27: Implementing Site-to-Site VPN


Part IX: Logging and Reporting

Chapter 28: Logging
Chapter 29: Enhanced NAT
Chapter 30: Scripting TMG


Part X: Troubleshooting

Chapter 31: Mastering the Art of Troubleshooting
Chapter 32: Exploring HTTP Protocol
Chapter 33: Using Network Monitor 3 for Troubleshooting TMG


From Proxy to TMG
TMG Performance Counters
Windows Internet Libraries
WPAD Script CARP Operation
Jim Harrison is a program manager on the Microsoft Forefront Edge Security Team who also designs integrated security solutions for Microsoft extranets and intranets. He is the coauthor of Microsoft's Forefront Community Page "Tales from the Edge". Jim is a former tester on the Microsoft ISA Server Sustained Engineering Team, and prior to that, served as an electronics technician for the US Navy.