A detailed look into best practice design, deployment, and maintenance of an ISA Server 2004 Environment. Written by industry expert Michael Noel, of Convergent Computing, ISA Server 2004 Unleashed provides guidance for ISA deployment scenarios, including step by step guides for configuring ISA to secure Exchange Outlook Web Access, deploying ISA Server 2004 Enterprise edition arrays, setting up Site to Site VPNs, deploying ISA as a reverse proxy in the DMZ of a firewall, and much more. This book covers ISA in great detail, with emphasis on real-world situations and labor-saving scripts that help administrators take control of an ISA environment and leverage its full potential to provide unprecedented levels of security to an environment.
The Target Audience of This Book.
The Organization of This Book.
Conventions Used in This Book.
I. DESIGNING, EXPLORING, AND UNDERSTANDING ISA SERVER 2004.
1. Introducing ISA Server 2004.
Understanding the Need for ISA Server 2004
Outlining the High Cost of Security Breaches
Outlining the Critical Role of Firewall Technology in a Modern Connected Infrastructure
Understanding the Growing Need for Application-Layer Filtering
Detailing the Additional Advantages of ISA Server 2004
Allowing for More Intelligent Remote Access with Virtual Private Networks (VPNs)
Using Web Caching to Improve and Control Web Browsing
Reducing Setup and Configuration Time with an ISA Server 2004 Hardware Solution
Reducing Administrative Overhead and Potential for Errors with Simplified Management Tools
Preserving Investment in Existing Security Solutions
Understanding the History of ISA Server 2004
Outlining Initial Microsoft Security Solutions
Exploring a New Product-Proxy Server
Unleashing a New Model: the Internet Security and Acceleration Server 2000
Unveiling the Next Generation: ISA Server 2004
Exploring the New Features of ISA Server 2004
Choosing the ISA Server 2004 Operating System
Choosing Between ISA Server 2004 Enterprise or Standard Editions
Detailing Deployment Strategies with ISA Server 2004
Deploying ISA Server 2004 as an Advanced Application-Layer Inspection Firewall
Securing Applications with ISA Server 2004's Reverse Proxy Capabilities
Accelerating Internet Access with ISA Server 2004's Web Caching Component
Controlling and Managing Client Access to Company Resources with Virtual Private Networks (VPNs)
Using the Firewall Client to Control Individual User Access
Augmenting an Existing Security Environment with ISA Server 2004
Utilizing ISA Server 2004 in Conjunction with Other Firewalls
Deploying ISA Server 2004 in a RADIUS Authentication Environment
Administering and Maintaining an ISA Server 2004 Environment
Taking Advantage of Improvements in ISA Management Tools
Backing Up and Restoring ISA Server Environments
Maintaining an ISA Server Environment
Monitoring and Logging Access
Using ISA Server 2004 to Secure Applications
Securing Exchange Outlook Web Access (OWA) with ISA Server 2004
Locking Down Web Application Access
Securing Remote Procedure Call (RPC) Traffic
2. Installing ISA Server 2004.
Reviewing ISA Server 2004 Prerequisites
Reviewing Hardware Prerequisites