Intrusion detection through centralized NT/2000 security event log monitoring!
Intrusion detection through centralized NT/2000 security event log monitoring!

Chapter 1: Helping Secure and Accelerate the Campus Internet with ISA Server 2000 Firewalls and Web Proxy Servers

DOC

ZIP

Chapter 2: Accelerating the Web Browsing Experience with ISA Server 2000

DOC

ZIP

Chapter 3: Optimizing Campus Web Browser Configuration

DOC

ZIP

Chapter 4: Stopping Unwanted E-mail and E-mail Attachments from Entering the Institution with ISA Server 2000

DOC

ZIP

Chapter 5: Automating ISA Server 2000 Web Proxy and Firewall Client Installation and Configuration

DOC

ZIP

Chapter 6: Controlling Internet Access for Campus Computers using ISA Server 2000

DOC

ZIP

Chapter 7: Protecting Departmental/Student LAN segments with ISA Server 2000

DOC

ZIP

 

Intrusion detection through centralized NT/2000 security event log monitoring!
Intrusion detection through centralized NT/2000 security event log monitoring!