Microsoft® Forefront(TM) Threat Management Gateway (TMG) Administrator's Companion (Anglais) Broché – 6 janvier 2010
|Neuf à partir de||Occasion à partir de|
Les clients ayant acheté cet article ont également acheté
Descriptions du produit
Présentation de l'éditeur
Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to:
- Implement TMG
- integrated security features
- Analyze your Web and perimeter security requirements and infrastructure
- Plan, install, and configure TMG
- Implement network intrusion prevention, proxy, caching, filtering
- Configure security for the Web, Microsoft Exchange Server, and SharePoint Products and Technologies
- Implement remote access and site-to-site VPNs
- Select and configure clients
- Monitor and troubleshoot protected systems with Network Monitor 3 and other tools
- Use scripting to configure systems and automate administration
- Plus, get a fully searchable eBook on the companion CD
For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
Biographie de l'auteur
Jim Harrison is a program manager on the Microsoft Forefront Edge Security Team who also designs integrated security solutions for Microsoft extranets and intranets. He is the coauthor of Microsoft's Forefront Community Page "Tales from the Edge". Jim is a former tester on the Microsoft ISA Server Sustained Engineering Team, and prior to that, served as an electronics technician for the US Navy.
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.
Détails sur le produit
En savoir plus sur les auteursDécouvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.
Dans ce livre(En savoir plus)
Commentaires en ligne
Commentaires client les plus utiles sur Amazon.com (beta)
The only strikes against it...
It is dry, as you would expect from most technical manuals. There is none of the humor of Mark Minasi or the exuberance of Tom Shinder's writing.
I have come across a couple items that I think are incorrect due to the book having been written before TMG 2010 was actually released. Microsoft Press has a section on their website for updates to books, but as of my writing this, no corrections have been posted.
Some of the concepts in here could probably use a little more thorough explanation (for me it was NLB). But all in all, a well done book. At this point in time, I would consider this a must-purchase if you are going to use TMG 2010.
I would suggest this book is for the more experienced user and for those who want to learn and come to understand what makes this software tick and the principles that drive it.
If you are looking for a quickie setup guide then this will not do it for you.
This books' weakness is lack of detail in describing how to set up and configure TMG up from scratch.
The previous "go to" book from Syngress was poorly edited but was salvaged by the author who created ISAServer.org and regularly answered forum posts. This TMG Admin's Companion is a standalone, logically organized, well-written guide devoid of unrelated marketing literature. It does not necessarily provide all the screen-by-screen instructions, but I don't think it should. It's not a "Dummies" or beginners book. The authors explain the technology, such as rule processing, the various clients, malware inspection and url-filtering. I especially liked the appendix sections on how the HTTP protocol and proxies work.
Administrator's Companion is not perfect - for instance, it is deficient in its treatment of arrays, is light on the various network topology options, and its advice on migration from ISA was very superficial - but it is a very good start for configuring and supporting TMG. Use it with the online resources in Technet and ISAServer.org.
Especially helpful are the "Real World" sections scattered throughout the book. These show actual TMG problems resolved and their underlying causes. For example, I was having a problem with IP Spoofing. Pp. 596-7 describe the problem in detail and how to resolve it. Another nice feature is chapter 33 on using Network Monitor 3 for Troubleshooting TMG.
While Microsoft Technet and the TMG built in help are somewhat helpful, I needed to know the how and why of the systems features. The authors' explanation of network protocols in conjunctin with TMG also help.
I recommend this book for any person planning to implement TMG. The book will help you plan properly and get the most out of the system. It is also helpful for troubleshooting.