absolute URLs, 211
access control, SACLs (system access control lists), 90
access rules
arrays, 266
arrays policies, 266
between remote site and internal network, 238
changing order of, 172
connection limits and, 217
content types, 136–137
creating enterprise access rules, 277
creating ISA communication access rules, 336
creating new, 169
deleting, 171
disabling, 170
enterprise policies for configuring, 277
internal client to Internet, 3
list of, 132
migration to ISA Server 2004 and, 90
network objects, 138–148
order of application, 284
overview of, 168
protocols, 133–135
RPC filters and, 167
schedules, 137
script for creating, 253
user sets, 135–136
VPN clients, 228
access, network, 348
account credentials, 283
accounts, configuring on domain controller, 52
active caching, 4, 90
Active Directory
enterprise-level roles and, 279
group access to VPNs, 221
integration of SharePoint Portal Server with, 316
ISA Server preauthentication and, 302
RADIUS authentication and, 226
user account permissions for connecting to VPNs, 228
Active Directory Application Mode. See ADAM (Active Directory Application Mode)
Active Directory Users And Computers, 228
Active Sync, 304
ADAM (Active Directory Application Mode)
array information stored in, 265
installation executable, 48
ISA Server scalability and, 9
ADAM Data folder, backing up, 280
adamsetup.exe, 48
AddComputer.vbs, 250–253
add-ons, ISA Server 2004, 16
address ranges
creating address range object, 142
Standard Edition with single network adapter, 24
address ranges. See IP addresses
administration, 205–212
certificate revocation, 208
delegating administrative tasks, 205
dial-in preferences, 207
enterprise and array policies and, 275
enterprise level, 276
firewall chaining configuration, 206
firewall client settings, 209
link translation configuration, 211
role-based, 36
viewing ISA Server details, 210
Administration Delegation Wizard, 205
Administration Tools, 28
administrative roles, Enterprise Edition
Array Administrator, 65
assigning, 36, 65
Enterprise Administrator, 65
overview of, 65, 279
Administrator account, 365
agents, MOM 2005
agent-based vs. agentless monitoring, 332
communication configuration, 335
deploying, 333
alerts, 106–113
acknowledging, 113
by e-mail, 108
configuration options, 111
configuring to run a program, 109
creating, 107
creating alert rules, 341
firewall breaches and, 3
intrusion detection, 216
overview of, 106
predefined, 106
reporting alert event to Windows Event Log, 110
resetting, 113
rule groups and, 340
SharePoint Services, 316
starting/stopping ISA Server services, 110
viewing, 112
Windows Event Logs, 110
All Authenticated Users, 136
All Networks (and Local Host), 140
All Protected Networks, 140
All Users, 136
Allow access, array access rules, 266, 285
Allowed Sites, System Policy, 145
antivirus software, disabling during upgrade installation, 365
application filters, 133, 265
application inspection, firewalls, 1
Application Log, Event Viewer, 105
Application mode, Terminal Services, 27
application settings, Firewall clients, 82
Application Usage Content, reports, 127
Application.ini file, Firewall clients, 86
application-layer filtering
ISA Server capabilities, 3
single network adapter configuration, 25
applications
legacy application support, 348
not installing on dedicated ISA Server computer, 20
Array Administrator
array administrative roles, 285
array policy administration, 275
Enterprise Edition administrative roles, 65
granting ability to create access rules, 286
policy management can be delegated to, 284
viewing enterprise policies, 276
Array Auditor
array administrative roles, 285
Enterprise Edition administrative roles, 65
Array Monitoring Auditor
array administrative roles, 284
Enterprise Array Administrator roles, 65
array policies, 284–286
access rules, 285
administration rights for, 275
backing up, restoring, deleting array configuration, 286
checking settings, 285
comparing with enterprise policies, 275
configuring, 286
creating access rules, 336
enterprise policies working in tandem with, 276
flexibility of combining with enterprise policies, 276
overview of, 284
role-based administration, 284
rules for applying effective policies, 284
arrays, 265–274
adding servers to ISA server array, 52
administering with policy set, 275
communication, 271–273
configuring, 266–269
configuring roles and permissions, 285
connecting to remote, 282
creating, 265
creating ISA Server array, 49
deleting, 269
DNS name for, 267
intra-array communication, 289–291
ISA Server scalability and, 9
managing, 270
managing centrally with enterprise polices, 277
member requirements, 265
moving server to different array, 270
renaming, 269
rules for applying enterprise policies at array level, 276
troubleshooting, 273–274
Web caching and, 4
attacks
Exchange Server vulnerabilities, 298
firewall breaches, 3
firewall configuration and, 20
intrusion detection and, 214
RPC-based, 305
authentication
array members, 268
certificate for workgroup authentication, 59
forms-based authentication, 303
legacy TCP/UDP connections, 3
Outlook clients via Exchange, 307
over SSL encrypted channel, 101
RADIUS, 212, 225
SharePoint Portal Server, 323
user authentication for caching, 41
VPN clients, 224
VPN options, 219
Web connections, 73
Web proxy clients, 75
Windows Authentication, 101
automatic dialing, network connection configuration, 207
Autorun, 21