
Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion
by Harrison, Jim; Diogenes, Yuri; Saxena, Mohit-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Yuri Diogenes is a Microsoft senior support escalation engineer specializing in Forefront Edge Security. He is coauthor of the Forefront Community Site “Tales from the Edge”, writes Forefront security articles for Microsoft TechNet Magazine, and is a primary contributor to the Microsoft ISA Server Team Blog. Before joining Microsoft, Yuri was a network advisor for a Microsoft Gold Partner and taught Network and Operating System disciplines at the University in Brazil. Jim Harrison is a program manager on the Microsoft Forefront Edge Security Team who also designs integrated security solutions for Microsoft extranets and intranets. He is the coauthor of Microsoft’s Forefront Community Page “Tales from the Edge”. Jim is a former tester on the Microsoft ISA Server Sustained Engineering Team, and prior to that, served as an electronics technician for the US Navy. Mohit Saxena is a senior technical lead on the Microsoft Forefront Edge Security Team. He advises Microsoft Support Escalation Engineers on Forefront Edge Security support issues, bugs, and design changes. Technical Reviewer Dr. Thomas W. Shinder, MCSE, is a Microsoft MVP for Forefront Edge Security, the author of six highly regarded books on Microsoft ISA Server, and the administrator of the largest community of ISA and TMG firewall administrators on the Internet, with over 500 articles on the ISA and TMG firewalls and over 50,000 registered users. He has worked as a technology trainer, writer, and consultant since 1996, and has provided consultative security guidance to Fortune 500 companies.
Table of Contents
- Foreword
- Acknowledgments
- Introduction
- Part I: A New Era for the Microsoft Firewall
- Chapter 1: What's New in TMG
- Chapter 2: What Are the Differences Between TMG and UAG?
- Part II: Planning for TMG
- Chapter 3: System Requirements
- Chapter 4: Analyzing Network Requirements
- Chapter 5: Choosing the Right Network Topology
- Chapter 6: Migrating to TMG
- Chapter 7: Choosing a TMG Client Type
- Part III: Implementing a TMG Deployment
- Chapter 8: Installing TMG
- Chapter 9: Troubleshooting TMG Setup
- Chapter 10: Exploring the TMG Console
- Part IV: TMG as Your Firewall
- Chapter 11: Configuring TMG Networks
- Chapter 12: Understanding Access Rules
- Chapter 13: Configuring Load-Balancing Capabilities
- Chapter 14: Network Inspection System
- Part V: TMG as Your Caching Proxy
- Chapter 15: Web Proxy Auto Discovery for TMG
- Chapter 16: Caching Concepts and Configuration
- Part VI: TMG Client Protection
- Chapter 17: Malware Inspection
- Chapter 18: URL Filtering
- Chapter 19: Enhancing E-Mail Protection
- Chapter 20: HTTP and HTTPS Inspection
- Part VII: TMG Publishing Scenarios
- Chapter 21: Understanding Publishing Concepts
- Chapter 22: Publishing Servers
- Chapter 23: Publishing Microsoft Office SharePoint Server
- Chapter 24: Publishing Exchange Server
- Part VIII: Remote Access
- Chapter 25: Understanding Remote Access
- Chapter 26: Implementing Dial-in Client VPN
- Chapter 27: Implementing Site-to-Site VPN
- Part IX: Logging and Reporting
- Chapter 28: Logging
- Chapter 29: Enhanced NAT
- Chapter 30: Scripting TMG
- Part X: Troubleshooting
- Chapter 31: Mastering the Art of Troubleshooting
- Chapter 32: Exploring HTTP Protocol
- Chapter 33: Using Network Monitor 3 for Troubleshooting TMG
- From Proxy to TMG
- TMG Performance Counters
- Windows Internet Libraries
- WPAD Script CARP Operation
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.