Dewey Decimal005.8
Table Of ContentIntroduction. The Target Audience of This Book. The Organization of This Book. Conventions Used in This Book. I. DESIGNING, EXPLORING, AND UNDERSTANDING ISA SERVER 2004. 1. Introducing ISA Server 2004. Understanding the Need for ISA Server 2004 Outlining the High Cost of Security Breaches Outlining the Critical Role of Firewall Technology in a Modern Connected Infrastructure Understanding the Growing Need for Application-Layer Filtering Detailing the Additional Advantages of ISA Server 2004 Allowing for More Intelligent Remote Access with Virtual Private Networks (VPNs) Using Web Caching to Improve and Control Web Browsing Reducing Setup and Configuration Time with an ISA Server 2004 Hardware Solution Reducing Administrative Overhead and Potential for Errors with Simplified Management Tools Preserving Investment in Existing Security Solutions Understanding the History of ISA Server 2004 Outlining Initial Microsoft Security Solutions Exploring a New Product-Proxy Server Unleashing a New Model: the Internet Security and Acceleration Server 2000 Unveiling the Next Generation: ISA Server 2004 Exploring the New Features of ISA Server 2004 Choosing the ISA Server 2004 Operating System Choosing Between ISA Server 2004 Enterprise or Standard Editions Detailing Deployment Strategies with ISA Server 2004 Deploying ISA Server 2004 as an Advanced Application-Layer Inspection Firewall Securing Applications with ISA Server 2004's Reverse Proxy Capabilities Accelerating Internet Access with ISA Server 2004's Web Caching Component Controlling and Managing Client Access to Company Resources with Virtual Private Networks (VPNs) Using the Firewall Client to Control Individual User Access Augmenting an Existing Security Environment with ISA Server 2004 Utilizing ISA Server 2004 in Conjunction with Other Firewalls Deploying ISA Server 2004 in a RADIUS Authentication Environment Administering and Maintaining an ISA Server 2004 Environment Taking Advantage of Improvements in ISA Management Tools Backing Up and Restoring ISA Server Environments Maintaining an ISA Server Environment Monitoring and Logging Access Using ISA Server 2004 to Secure Applications Securing Exchange Outlook Web Access (OWA) with ISA Server 2004 Locking Down Web Application Access Securing Remote Procedure Call (RPC) Traffic Summary Best Practices 2. Installing ISA Server 2004. Reviewing ISA Server 2004 Prerequisites Reviewing Hardware Prerequisites Understanding ISA Operating System Requirements &nb
SynopsisComprehensive guide to Internet Security and Acceleration (ISA) Server 2004 from established Microsoft insiders., Hit the ground running with the detailed, road-tested deployment scenarios featured in "Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed." Written by best-selling authors Michael Noel, who has been involved with the early beta of ISA Server 2004, and Rand Morimoto, president of Convergent Computing, which implements beta versions of Microsoft servers, this book will provide you the level of detailed guidance required for the planning, installation, deployment, migration, administration and troubleshooting of topics related to ISA server 2004. "Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed" is your comprehensive guide to ISA Server 2004 from established Microsoft insiders., A detailed look into best practice design, deployment, and maintenance of an ISA Server 2004 Environment. Written by industry expert Michael Noel, of Convergent Computing, ISA Server 2004 Unleashed provides guidance for ISA deployment scenarios, including step by step guides for configuring ISA to secure Exchange Outlook Web Access, deploying ISA Server 2004 Enterprise edition arrays, setting up Site to Site VPNs, deploying ISA as a reverse proxy in the DMZ of a firewall, and much more. This book covers ISA in great detail, with emphasis on real-world situations and labor-saving scripts that help administrators take control of an ISA environment and leverage its full potential to provide unprecedented levels of security to an environment.
LC Classification NumberTK5105.59