Book description
Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides end-to-end security stretching from Web servers back to the desktop. This book will provide system administrators familiar with Syngress' existing Microsoft networking and security titles with a complete reference to Microsoft's flagship security products.- First book to address securing an entire Microsoft network from Web servers all the way back to the desktop
- Companion Web site provides best practices checklists for securing Microsoft operating systems, applications, servers, and databases
- Companion Web site provides special chapter on designing and implementing a disaster recover plan for a Microsoft network
Table of contents
- Copyright
- Technical Editor
- Contributing Authors
- 1. Introduction to Microsoft Forefront Security Suite
-
2. Forefront Security for Microsoft Windows Clients
- Introduction
- How to Use Microsoft Forefront Client Security
- Troubleshooting Microsoft Forefront Client Security
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- 3. Deploying Windows Server Update Services to Forefront Clients
- 4. Observing and Maintaining Microsoft Forefront Clients
- 5. Using Forefront to Guard Microsoft Exchange Server
- 6. Managing Microsoft SharePoint Portal Securely Using Forefront
-
7. Managing and Maintaining Microsoft Forefront Servers
- Introduction
- Implementing a Backup Strategy
- Utilizing the Microsoft FSSMC
- Adding/Removing Users
- Adding/Removing Servers
- Server Groups
- Global Configuration
- Packages
- Jobs
- Quarantine Manager
- Detections
- SMTP Traffic
- Engine Versions
- Alerts
- Alert Logs
- Notification Logs
- Summary
- Solutions Fast Track
- Frequently Asked Questions
-
8. Using Intelligent Application Gateway 2007
- Introduction
- Implementing an Intelligent Application Gateway 2007
- Configuring the Whale Intelligent Communication Application Gateway 2007
- Configuring ISA Server to Allow Communication Between the Two Servers
-
Utilizing the Whale Communication Intelligent Application Gateway Tools
- Whale Communication Intelligent Application Gateway 2007 Web Portal
- Whale Communication Intelligent Application Gateway Editor
- Whale Communication Intelligent Application Gateway Service Policy Manager
- Whale Communication Intelligent Application Web Monitor
- Creating and Managing Intelligent Application Gateway Endpoint Policies
- Summary
-
Solutions Fast Track
- Implementing an Intelligent Application Gateway 2007
- Configuring the Whale Communication Intelligent Application Gateway 2007
- Configuring ISA Server to Allow Communication between the Two Servers
- Utilizing the Whale Communication Intelligent Application Gateway Tools
- Creating and Managing Intelligent Application Gateway Endpoint Policies
- Frequently Asked Questions
- 9. Using Outlook Web Access through the Intelligent Application Gateway
- 10. Configuring Virtual Private Network Traffic Through the Intelligent Application Gateway
- 11. Configuring Microsoft Internet Security and Acceleration Server 2006
-
12. Microsoft Internet Security and Acceleration 2006 Server Publishing
- Introduction
-
Publishing Servers behind a Microsoft Internet Security and Acceleration 2006 Server Firewall
- Basics of Publishing
- Server Publishing Rule
- Web Publishing Rule
- Network Configuration and Name Resolution for Publishing
- Configuring the Web Listener
- Configuring Publishing
-
HTTP Filtering
- Maximum Header Length
- Maximum Payload Length
- Maximum URL Length
- Maximum Query Length
- Verify Normalization
- Block High-Bit Characters
- Block Request Containing a Windows Executable
- HTTP Method
- File Extension
- Block Requests Containing Ambiguous Extensions
- HTTP Header
- Server Header Rewrite
- Via Header Rewrite
- Specific HTTP Header Value in Request or Response
- Path Mapping
- Link Translation
- Exercise: Configure Web Publishing Rule
- Publishing Exchange Web Client Access
- Publishing SharePoint Sites
- Publishing a Web Farm
- Publishing Non-Web Server Protocols
- Exercise: Publishing Terminal Services
- Publishing Mail Servers
- Troubleshooting Publishing Servers behind a Microsoft Internet Security and Acceleration 2006 Server Firewall
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- 13. Managing ISA 2006 Server Connections between Sites
-
14. Proxy Functions of Microsoft Internet Security and Acceleration Server 2006
- Introduction
- Using Microsoft Internet Security and Acceleration 2006 as a Proxy Server
- Configuring Microsoft Internet Security and Acceleration 2006 to Cache BITS Content
- Using the Differentiated Services on Microsoft Internet Security and Acceleration 2006 to Regulate Traffic
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- A. Conducting Penetration Testing on an Enterprise Using the Microsoft Forefront Security Suite
Product information
- Title: Microsoft Forefront Security Administration Guide
- Author(s):
- Release date: February 2009
- Publisher(s): Syngress
- ISBN: 9780080558721
You might also like
book
Windows Server 2003 Security: A Technical Reference
"Once again, Roberta Bragg proves why she is a leading authority in the security field! It's …
book
Internet Information Services (IIS) 7.0 Administrator’s Pocket Consultant
Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of Web servers …
book
Microsoft Internet Information Services 7.0
This guide provides a consistent structure for addressing the decisions and activities critical to the successful …
book
Internet Information Services Administration
Administrators who know IIS from previous versions need this book to show them in concrete detail …