Chapter 17. Malware Inspection

  • Understanding Malware Inspection in TMG 427

  • Configuring Malware Inspection 431

  • Creating Reports with Malware Statistics 446

  • Summary 463

Chapter 1 gave you a detailed breakdown of the traffic flow through the Malware and the Web Proxy filters. What you’ll gain in this chapter is a functional understanding of the malware inspection options and their impact on TMG behavior as well as the user experience created by those selections.

Understanding Malware Inspection in TMG

As more ne’er-do-wells and miscreants try to gain access to our wallets, medical histories, and financial resources through attacks on Web sites; and as the malware they create in support of their nefarious deeds grows ever more prevalent; and as more users ...

Get Microsoft® Forefront® Threat Management Gateway (TMG) Administrator’s Companion now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.