TMG Firewall Name Resolution (Part 3)
In this article we’ll take a look at how to configure the firewall in a number of different deployment scenarios and determine what the best configuration options are in each of those cases. Continue...
View ArticleTMG Firewall Policy Tips and Tricks
Here’s a great article by Richard Hicks on TMG firewall policy tips and tricks! Definitely worth a read!...
View ArticleThe Amazing Hyper-V Network Virtualization in Windows Server 2012
Continue reading here: The Amazing Hyper-V Network Virtualization in Windows Server 2012
View ArticlePlanning for SharePoint Publishing with TMG
In this article, we’ll look at some of the planning considerations for publishing SharePoint servers with TMG. Read More: Planning for SharePoint Publishing with TMG
View ArticleThe Human Side of the Firewall
We talk a lot here about technology, but security experts are increasingly focusing on the human element in security, and a new paper says we should be building human firewalls. View article: The Human...
View ArticleExploring TMG replacement possibilities
Since Microsoft announced the discontinuation of most of their Forefront products, including TMG, last fall, many network admins have begun investigating possible replacements. See original article:...
View ArticleSecure your devices with 3 quick Microsoft Forefront UAG tips
See original article: Secure your devices with 3 quick Microsoft Forefront UAG tips
View ArticleThe Future Is Now! Next Generation Remote Access Today with Windows Server...
See original article: The Future Is Now! Next Generation Remote Access Today with Windows Server 2012 DirectAccess
View ArticleMonitoring and Blocking Network Access Based on Geographic Location using...
In this article I will demonstrate some methods that security engineers and Forefront TMG firewall administrators can use to identify, monitor, and block network communication based on the geographic...
View ArticleUnderstanding TMG Logging (Part 3)
In this Part 3 of our article series, we’ll take a closer look at SQL configuration and text logging options. Read More: Understanding TMG Logging (Part 3)
View ArticleUnderstanding TMG Logging (Part 4)
In this last installment, we’ll finish up the discussion of TMG logging by talking about the Log Queue, options for logging and logging best practices. See more here: Understanding TMG Logging (Part 4)
View Article5 Obscure and Confusing Settings in Forefront Threat Management Gateway (TMG)...
In this month’s article I’ll explore what I consider to be the top 5 obscure and confusing settings that seem to trip people up the most. Originally posted here: 5 Obscure and Confusing Settings in...
View ArticleProduct Review – Portsys Unified Access Gateway
The author takes a look at Portsys Unified Access Gateway. Read More: Product Review – Portsys Unified Access Gateway
View ArticleTroubleshooting the TMG Firewall with Network Monitor (Part 1)
In this article, we took a look at a basic overview of Network Monitor 3.4. View article: Troubleshooting the TMG Firewall with Network Monitor (Part 1)
View ArticleForefront UAG backup and restore Capabilities
In this article the author reviews backup and recovery capabilities within Forefront UAG and explains how to create automatic or manually backups to be able to recover a faulty Forefront UAG. Read the...
View ArticleLife after TMG: Considering Sophos UTM as a TMG Replacement (Part 1)
In the first of this series of articles, we’ll discuss some of the benefits of using Sophos UTM as a replacement for TMG and take a look at UTM’s firewall and NAT features and functionalities as well...
View ArticleForefront UAG authentication options
In this article the author explores the different authentication options in Forefront UAG, specially the authentication configuration against Microsoft Active Directory for the Forefront UAG portal...
View ArticleConsiderations for the TMG Firewall in Supporting Services (Part 1)
In this article we will go over a few of the high level but critically important considerations that you’re likely to encounter when configuring DNS settings on your TMG firewall. Read More:...
View ArticleSecure File Transfer with Microsoft FTP over SSL and Forefront Threat...
In this article article I’ll demonstrate how to build a secure file transfer solution using the Microsoft FTP server included with Windows Server 2012 R2 and the Forefront Threat Management Gateway...
View Article