Configuration - Security

Last Updated on 4 Feb. 2014, Total: 159 Articles and Tutorials

How to properly configure the ISA Firewall to protect against malicious threats.

  1. Configure Remote SQL Server Logging for Forefront Threat Management Gateway (TMG) 2010

    This article will look at how to prepare an SQL server to accept log data from Forefront TMG and demonstrate how to configure Forefront TMG 2010 for remote SQL server logging... Read More

  2. Secure File Transfer with Microsoft FTP over SSL and Forefront Threat Management Gateway (TMG) 2010

    In this article article I’ll demonstrate how to build a secure file transfer solution using the Microsoft FTP server included with Windows Server 2012 R2 and the Forefront Threat Management Gateway (TMG) 2010 firewall... Read More

  3. Configure Windows Azure Multi-Factor Authentication with Forefront Threat Management Gateway (TMG) 2010

    This article takes a look at configuring Windows Azure Multi-Factor Authentication with Forefront Threat Management Gateway (TMG) 2010... Read More

  4. Improving SSL Security for Forefront Threat Management Gateway (TMG) 2010 Published Web Sites

  5. Monitoring and Blocking Network Access Based on Geographic Location using Forefront Threat Management Gateway (TMG) 2010

    In this article I will demonstrate some methods that security engineers and Forefront TMG firewall administrators can use to identify, monitor, and block network communication based on the geographic location of the source or destination IP address... Read More

  6. Configuring SafeSearch Enforcement in Forefront Threat Management Gateway (TMG)

    In this article the author takes a look at SafeSearch enforcement which is an enhancement to the URL filtering capabilities in Forefront TMG 2010... Read More

  7. Microsoft Forefront UAG - Configuring Forefront UAG as a DirectAccess Server (Part 3)

    In this third article of the series, the author explains how to monitor DirectAccess client connections and how to troubleshoot DirectAccess connectivity problems... Read More

  8. Microsoft Forefront UAG - Configuring Forefront UAG as a DirectAccess Server (Part 2)

    In this article the author explains how to configure Forefront UAG as a DirectAccess Server... Read More

  9. Implementing Secure Remote Access with PPTP and Forefront Threat Management Gateway (TMG) 2010 (Part 2)

    In this article we'll look at an additional layer of protection for PPTP by configuring the Protected Extensible Authentication Protocol (PEAP) with client certificate authentication and integrating and enforcing Network Access Protection (NAP) with VPN client quarantine... Read More

  10. Implementing Secure Remote Access with PPTP and Forefront Threat Management Gateway (TMG) 2010 (Part 1)

    In this article I’ll demonstrate how to deploy PPTP VPN in a more secure manner. In addition I’ll briefly discuss secure alternatives to PPTP... Read More

Featured Links