Chapter 1. Introducing ISA Server 2004
IN THIS CHAPTER
The rise in the prevalence of computer viruses, threats, and exploits on the Internet has made it necessary for organizations of all shapes and sizes to reevaluate their protection strategies. No longer is it possible to ignore or minimize these threats because the damage they can cause can cripple a company's business functions. A solution to the increased sophistication and pervasiveness of these viruses and exploits is becoming increasingly necessary.
Corresponding with the growth of these threats has been the development and maturation of the Internet Security and Acceleration (ISA) Server product from Microsoft. The latest release of the product, ISA Server 2004, is fast becoming a business-critical component for many organizations who are finding that many of the traditional packet filtering firewalls and technologies don't necessarily stand up to modern threats. The ISA Server 2004 product provides for that higher level of application security required, particularly for common tools such as Outlook Web Access (OWA) and web applications.
In addition to a new array of firewall functionality, ISA Server 2004 provides robust Virtual Private Networking (VPN) support and enhanced web caching capabilities, all within a simplified management interface. It also provides for a high degree of integration into an environment with existing security infrastructure in place, providing for an additional layer of security that could not have been achieved otherwise.
This book gives an in-depth analysis of the ISA Server 2004 product, with an emphasis on exploring "best practice" approaches that can be used when implementing an ISA Server 2004 environment. These examples are gathered from real-world implementations and lessons learned from the field with the product. Because a majority of ISA Server implementations are established to complementrather than replaceexisting security infrastructure, particular emphasis is placed on the information and tools necessary to supplement these environments with ISA Server 2004. Third-party security tools, intrusion detection techniques, and firewall and VPN products working in coexistence with ISA Server 2004 are detailed throughout the chapters.