Index


A

absolute URLs, 211

access control, SACLs (system access control lists), 90

access rules

arrays, 266

arrays policies, 266

between remote site and internal network, 238

changing order of, 172

connection limits and, 217

content types, 136–137

creating enterprise access rules, 277

creating ISA communication access rules, 336

creating new, 169

deleting, 171

disabling, 170

enterprise policies for configuring, 277

internal client to Internet, 3

list of, 132

migration to ISA Server 2004 and, 90

network objects, 138–148

order of application, 284

overview of, 168

protocols, 133–135

RPC filters and, 167

schedules, 137

script for creating, 253

user sets, 135–136

VPN clients, 228

access, network, 348

account credentials, 283

accounts, configuring on domain controller, 52

active caching, 4, 90

Active Directory

enterprise-level roles and, 279

group access to VPNs, 221

integration of SharePoint Portal Server with, 316

ISA Server preauthentication and, 302

RADIUS authentication and, 226

user account permissions for connecting to VPNs, 228

Active Directory Application Mode. See ADAM (Active Directory Application Mode)

Active Directory Users And Computers, 228

Active Sync, 304

ADAM (Active Directory Application Mode)

array information stored in, 265

installation executable, 48

ISA Server scalability and, 9

ADAM Data folder, backing up, 280

adamsetup.exe, 48

AddComputer.vbs, 250–253

add-ons, ISA Server 2004, 16

address ranges

creating address range object, 142

Standard Edition with single network adapter, 24

address ranges. See IP addresses

administration, 205–212

certificate revocation, 208

delegating administrative tasks, 205

dial-in preferences, 207

enterprise and array policies and, 275

enterprise level, 276

firewall chaining configuration, 206

firewall client settings, 209

link translation configuration, 211

role-based, 36

viewing ISA Server details, 210

Administration Delegation Wizard, 205

Administration Tools, 28

administrative roles, Enterprise Edition

Array Administrator, 65

assigning, 36, 65

Enterprise Administrator, 65

overview of, 65, 279

Administrator account, 365

agents, MOM 2005

agent-based vs. agentless monitoring, 332

communication configuration, 335

deploying, 333

alerts, 106–113

acknowledging, 113

by e-mail, 108

configuration options, 111

configuring to run a program, 109

creating, 107

creating alert rules, 341

firewall breaches and, 3

intrusion detection, 216

overview of, 106

predefined, 106

reporting alert event to Windows Event Log, 110

resetting, 113

rule groups and, 340

SharePoint Services, 316

starting/stopping ISA Server services, 110

viewing, 112

Windows Event Logs, 110

All Authenticated Users, 136

All Networks (and Local Host), 140

All Protected Networks, 140

All Users, 136

Allow access, array access rules, 266, 285

Allowed Sites, System Policy, 145

antivirus software, disabling during upgrade installation, 365

application filters, 133, 265

application inspection, firewalls, 1

Application Log, Event Viewer, 105

Application mode, Terminal Services, 27

application settings, Firewall clients, 82

Application Usage Content, reports, 127

Application.ini file, Firewall clients, 86

application-layer filtering

ISA Server capabilities, 3

single network adapter configuration, 25

applications

legacy application support, 348

not installing on dedicated ISA Server computer, 20

Array Administrator

array administrative roles, 285

array policy administration, 275

Enterprise Edition administrative roles, 65

granting ability to create access rules, 286

policy management can be delegated to, 284

viewing enterprise policies, 276

Array Auditor

array administrative roles, 285

Enterprise Edition administrative roles, 65

Array Monitoring Auditor

array administrative roles, 284

Enterprise Array Administrator roles, 65

array policies, 284–286

access rules, 285

administration rights for, 275

backing up, restoring, deleting array configuration, 286

checking settings, 285

comparing with enterprise policies, 275

configuring, 286

creating access rules, 336

enterprise policies working in tandem with, 276

flexibility of combining with enterprise policies, 276

overview of, 284

role-based administration, 284

rules for applying effective policies, 284

arrays, 265–274

adding servers to ISA server array, 52

administering with policy set, 275

communication, 271–273

configuring, 266–269

configuring roles and permissions, 285

connecting to remote, 282

creating, 265

creating ISA Server array, 49

deleting, 269

DNS name for, 267

intra-array communication, 289–291

ISA Server scalability and, 9

managing, 270

managing centrally with enterprise polices, 277

member requirements, 265

moving server to different array, 270

renaming, 269

rules for applying enterprise policies at array level, 276

troubleshooting, 273–274

Web caching and, 4

attacks

Exchange Server vulnerabilities, 298

firewall breaches, 3

firewall configuration and, 20

intrusion detection and, 214

RPC-based, 305

authentication

array members, 268

certificate for workgroup authentication, 59

forms-based authentication, 303

legacy TCP/UDP connections, 3

Outlook clients via Exchange, 307

over SSL encrypted channel, 101

RADIUS, 212, 225

SharePoint Portal Server, 323

user authentication for caching, 41

VPN clients, 224

VPN options, 219

Web connections, 73

Web proxy clients, 75

Windows Authentication, 101

automatic dialing, network connection configuration, 207

Autorun, 21




Microsoft Internet Security and Acceleration ISA Server 2004 Administrator's Pocket Consultant
Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrators Pocket Consultant (Pro-Administrators Pocket Consultant)
ISBN: 0735621888
EAN: 2147483647
Year: 2006
Pages: 173

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net