Home > Store

Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion

Register your product to gain access to bonus material or receive a coupon.

Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion

eBook (Watermarked)

  • Your Price: $38.39
  • List Price: $47.99
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.


  • Copyright 2010
  • Dimensions: 7-3/8" x 9"
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-7356-4052-1
  • ISBN-13: 978-0-7356-4052-8

Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to:

  • Implement TMG
  • integrated security features
  • Analyze your Web and perimeter security requirements and infrastructure
  • Plan, install, and configure TMG
  • Implement network intrusion prevention, proxy, caching, filtering
  • Configure security for the Web, Microsoft Exchange Server, and SharePoint Products and Technologies
  • Implement remote access and site-to-site VPNs
  • Select and configure clients
  • Monitor and troubleshoot protected systems with Network Monitor 3 and other tools
  • Use scripting to configure systems and automate administration
  • Plus, get a fully searchable eBook on the companion CD

For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

Sample Content

Table of Contents

  • Foreword
  • Acknowledgments
  • Introduction
  • Part I: A New Era for the Microsoft Firewall
    • Chapter 1: What's New in TMG
    • Chapter 2: What Are the Differences Between TMG and UAG?
  • Part II: Planning for TMG
    • Chapter 3: System Requirements
    • Chapter 4: Analyzing Network Requirements
    • Chapter 5: Choosing the Right Network Topology
    • Chapter 6: Migrating to TMG
    • Chapter 7: Choosing a TMG Client Type
  • Part III: Implementing a TMG Deployment
    • Chapter 8: Installing TMG
    • Chapter 9: Troubleshooting TMG Setup
    • Chapter 10: Exploring the TMG Console
  • Part IV: TMG as Your Firewall
    • Chapter 11: Configuring TMG Networks
    • Chapter 12: Understanding Access Rules
    • Chapter 13: Configuring Load-Balancing Capabilities
    • Chapter 14: Network Inspection System
  • Part V: TMG as Your Caching Proxy
    • Chapter 15: Web Proxy Auto Discovery for TMG
    • Chapter 16: Caching Concepts and Configuration
  • Part VI: TMG Client Protection
    • Chapter 17: Malware Inspection
    • Chapter 18: URL Filtering
    • Chapter 19: Enhancing E-Mail Protection
    • Chapter 20: HTTP and HTTPS Inspection
  • Part VII: TMG Publishing Scenarios
    • Chapter 21: Understanding Publishing Concepts
    • Chapter 22: Publishing Servers
    • Chapter 23: Publishing Microsoft Office SharePoint Server
    • Chapter 24: Publishing Exchange Server
  • Part VIII: Remote Access
    • Chapter 25: Understanding Remote Access
    • Chapter 26: Implementing Dial-in Client VPN
    • Chapter 27: Implementing Site-to-Site VPN
  • Part IX: Logging and Reporting
    • Chapter 28: Logging
    • Chapter 29: Enhanced NAT
    • Chapter 30: Scripting TMG
  • Part X: Troubleshooting
    • Chapter 31: Mastering the Art of Troubleshooting
    • Chapter 32: Exploring HTTP Protocol
    • Chapter 33: Using Network Monitor 3 for Troubleshooting TMG
  • From Proxy to TMG
  • TMG Performance Counters
  • Windows Internet Libraries
  • WPAD Script CARP Operation


Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership