SlideShare a Scribd company logo
1 of 13
Implementing Forefront Threat
Management Gateway 2010
Course Introduction
Introduction
 Name
 Company affiliation
 Title/function
 Job responsibility
 Previous experience with Microsoft ISA Server
 Expectations
Facilities
             Class hours
             Building hours
             Parking
             Restrooms
             Meals
             Phones
             Messages
             Smoking
             Recycling
About This Course
 Description
 Learning objectives
 Audience
 Prerequisites
Course Description
 Prepares you to create security solutions based on
 Microsoft Forefront Threat Management Gateway 2010
 (TMG)
 Covers the following usage scenarios:
   Secure Web Gateway
   Remote Access Gateway
   Secure Mail Relay
 Organized in 5 modules
 Delivered in 16 hours
 Instructor-led with 4 hands-on labs
Course Objectives
 This course will enable you to:
    Understand the new features and the value proposition for
    Forefront TMG
    Explain how Forefront TMG protects clients and servers from Web-
    based threats
    Describe how Forefront TMG enable outside systems to secure
    connect to internal services and applications
    Describe how Forefront TMG integrates with Microsoft®
    Forefront™ Protection 2010 for Exchange Server and Microsoft®
    Exchange Server 2010 to protect an organization from mail-based
    threats
    Design an enterprise solution using Forefront TMG, considering
    availability, scalability, operations, and migration from an existing
    Microsoft® Internet Security and Acceleration Server (ISA) solution
Target Audience
 Solution specialists and technical sales professionals with a
 focus on selling security solutions
 Architects and consultants involved in designing and
 deploying solutions based on Forefront TMG
 Technical account managers and premier field engineers
 who want to acquire in-depth knowledge of the design
 and deployment of Forefront TMG solutions
Prerequisites
 Working knowledge of Active Directory® and Group Policy
    No specific Windows Server® 2008 R2 knowledge is required
 Good understanding of Windows® networking
Course Outline – Day 1
Schedule    Module or Activity    Goals
9 :00 to    Module 1: Forefront    Describe a brief history of the Microsoft edge security products.
11:00 AM    Threat Management      Explain the current threat landscape and how this drove changes in
            Gateway 2010            the edge security strategy.
            Overview               List the new features in Forefront TMG and their value propositions.
                                   Describe the key scenarios for Forefront TMG and how it
                                    differentiates from Microsoft® IAG/UAG.
                                   Describe the SKU differentiation and subscription model.
                                   Explain the installation requirements and install process for
                                    Forefront TMG.
11 :00 AM   Lab 1: Installing      Install Forefront TMG to provide web and e-mail access between
to noon     Threat Management       Contoso and the Internet.
            Gateway 2010           Perform an initial configuration of Forefront TMG using the Getting
                                    Started wizards.
Noon to     Lunch
1:00 PM
1:00 to     Module 1: Secure       Describe the threats affecting enterprise users browsing the Web.
3:00 PM     Web Gateway            Identify the key Forefront TMG features that address those threats
                                    (application proxy, granular access control, malware inspection, URL
                                    filtering, HTTPS inspection, NIS), and describe each of these
                                    features in detail.
3:00 to     Lab 2: Configure       Create web access policies for Contoso users, including inspection
5:00 PM     Secure Web Gateway      of HTTPS sessions.
                                   Modify web access policy to include protection from malware.
                                   Investigate the Network Inspection System (NIS).
Course Outline – Day 2
Schedule      Module or Activity      Goals
9:00 to       Module 3: Remote         Understand how Forefront TMG can publish Web and non-Web services to
11:00 AM      Access Gateway            external users.
                                       Explain the security features and benefits added by Forefront TMG in each of
                                        these publishing scenarios.
                                       Discuss the new Forefront TMG features for virtual private networking, such as
                                        Secure Socket Tunneling Protocol (SSTP) and Network Access Protection (NAP).
11:00 AM to   Lab 3: Remote            Use Web Publishing to publish Exchange Web Services
Noon          Access Gateway
Noon to       Lunch
1 :00 PM
1:00 to       Module 4: Secure         Describe the mail threats facing organization, and explain what the key Forefront
2:00 PM       Mail Relay                TMG features are that address these threats.
                                       Explain how Forefront TMG and Forefront Protection 2010 for Exchange Server
                                        are deployed together for premium antispam and antimalware protection.
                                       Describe in detail how Forefront TMG performs spam filtering, malware filtering,
                                        and content filtering.
                                       Describe the implementation process for this scenario and how the solution is
                                        configured.
2:00 to       Lab 4: Secure Mail       Configure the Exchange Edge Transport role and Forefront Protection 2010 for
3:00 PM       Relay                     Exchange Server on the Forefront TMG server to protect Internet e-mail.
                                       Explore antispam and antimalware protection of Internet e-mail.

3:00 to       Module 5: Forefront  Review the network, scalability, availability and operational considerations and
4:00 PM       TMG Design and        best practices when designing and deploying a solution based on Forefront
              Deployment            TMG.
              Considerations       Identify the best practices when configuring clients to use Forefront TMG.
                                       Describe migration procedures from ISA Server to Forefront TMG, and between
                                        the different versions of Forefront TMG.
Classroom Setup
 Each student has their own virtualized lab environment
 Virtual machines:
     External Web server
     Firewall                                   8GB System

     Domain controller                      w/ Microsoft Hyper-V


     Mail server
     Collaboration server
     Windows client
     Forefront Protection
     Management server
Questions
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Forefront, Windows and other product names are or may be registered trademarks and/or
trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because
Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee
the accuracy of any information provided after the date of this presentation.
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related Content

What's hot

Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityRamesh Nagappan
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
Wapples brochure v1 4 eng
Wapples brochure v1 4 engWapples brochure v1 4 eng
Wapples brochure v1 4 enghasbro505
 
Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat ManagementVCW Security Ltd
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...Microsoft Private Cloud
 
RSS Reader: Complete integration within IBM Lotus Notes client
RSS Reader: Complete integration within IBM Lotus Notes clientRSS Reader: Complete integration within IBM Lotus Notes client
RSS Reader: Complete integration within IBM Lotus Notes clientGBS PAVONE Groupware GmbH
 
Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ralbary
 
Cyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guideCyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guidesupport_cyberoam
 
FortiGate-310B Datasheet
FortiGate-310B DatasheetFortiGate-310B Datasheet
FortiGate-310B Datasheetdemoteam
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentationSoap MacTavish
 
Scm ds oct_2010
Scm ds oct_2010Scm ds oct_2010
Scm ds oct_2010sukoneta
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2Irsandi Hasan
 
Fg80 series
Fg80 seriesFg80 series
Fg80 seriespatchs
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBMChris Sparshott
 

What's hot (20)

Mcafee ips nsp-2011
Mcafee ips  nsp-2011Mcafee ips  nsp-2011
Mcafee ips nsp-2011
 
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Wapples brochure v1 4 eng
Wapples brochure v1 4 engWapples brochure v1 4 eng
Wapples brochure v1 4 eng
 
Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat Management
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
 
RSS Reader: Complete integration within IBM Lotus Notes client
RSS Reader: Complete integration within IBM Lotus Notes clientRSS Reader: Complete integration within IBM Lotus Notes client
RSS Reader: Complete integration within IBM Lotus Notes client
 
Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01
 
Implementing Application Security
Implementing Application SecurityImplementing Application Security
Implementing Application Security
 
Cyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guideCyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guide
 
Ccnsp
CcnspCcnsp
Ccnsp
 
Cornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product LineCornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product Line
 
FortiGate-310B Datasheet
FortiGate-310B DatasheetFortiGate-310B Datasheet
FortiGate-310B Datasheet
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
 
Scm ds oct_2010
Scm ds oct_2010Scm ds oct_2010
Scm ds oct_2010
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2
 
Fg80 series
Fg80 seriesFg80 series
Fg80 series
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBM
 

Viewers also liked

Open lms 소개서
Open lms 소개서Open lms 소개서
Open lms 소개서tekville2
 
비즈뿌리오 소개서(2016)
비즈뿌리오 소개서(2016)비즈뿌리오 소개서(2016)
비즈뿌리오 소개서(2016)Jason Kim
 
Why is email security important?
Why is email security important?Why is email security important?
Why is email security important?NeoCertified
 
IT전략계획-04.보안 아키텍처
IT전략계획-04.보안 아키텍처IT전략계획-04.보안 아키텍처
IT전략계획-04.보안 아키텍처InGuen Hwang
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking Salman Memon
 
[오픈소스컨설팅]엔터프라이즈 오픈소스 도입전략
[오픈소스컨설팅]엔터프라이즈 오픈소스 도입전략[오픈소스컨설팅]엔터프라이즈 오픈소스 도입전략
[오픈소스컨설팅]엔터프라이즈 오픈소스 도입전략Ji-Woong Choi
 

Viewers also liked (8)

Open lms 소개서
Open lms 소개서Open lms 소개서
Open lms 소개서
 
비즈뿌리오 소개서(2016)
비즈뿌리오 소개서(2016)비즈뿌리오 소개서(2016)
비즈뿌리오 소개서(2016)
 
Why is email security important?
Why is email security important?Why is email security important?
Why is email security important?
 
IT전략계획-04.보안 아키텍처
IT전략계획-04.보안 아키텍처IT전략계획-04.보안 아키텍처
IT전략계획-04.보안 아키텍처
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
 
[오픈소스컨설팅]엔터프라이즈 오픈소스 도입전략
[오픈소스컨설팅]엔터프라이즈 오픈소스 도입전략[오픈소스컨설팅]엔터프라이즈 오픈소스 도입전략
[오픈소스컨설팅]엔터프라이즈 오픈소스 도입전략
 

Similar to 50357 a enu-module00

Microsoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 DatasheetMicrosoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 DatasheetMicrosoft Private Cloud
 
Forefront tmg 2010 Network Inspection System & Custom Protocols
Forefront tmg 2010 Network Inspection System & Custom ProtocolsForefront tmg 2010 Network Inspection System & Custom Protocols
Forefront tmg 2010 Network Inspection System & Custom Protocols► Supreme Mandal ◄
 
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response HeadersUSENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response HeadersAditya K Sood
 
Real time operating systems (rtos) concepts 9
Real time operating systems (rtos) concepts 9Real time operating systems (rtos) concepts 9
Real time operating systems (rtos) concepts 9Abu Bakr Ramadan
 
On Premises Protection Technologies
On Premises Protection TechnologiesOn Premises Protection Technologies
On Premises Protection TechnologiesCurtis Parker
 
50357 a enu-labmanual01
50357 a enu-labmanual0150357 a enu-labmanual01
50357 a enu-labmanual01Frank olazo
 
Web Services Security Tutorial
Web Services Security TutorialWeb Services Security Tutorial
Web Services Security TutorialJorgen Thelin
 
Microsoft Forefront - Online Security For Exchange Whitepaper
Microsoft Forefront -  Online Security For Exchange WhitepaperMicrosoft Forefront -  Online Security For Exchange Whitepaper
Microsoft Forefront - Online Security For Exchange WhitepaperMicrosoft Private Cloud
 
DYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGESDYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGESijsptm
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web SystemsInnoTech
 
Open sso enterprise customer pitch
Open sso enterprise customer pitchOpen sso enterprise customer pitch
Open sso enterprise customer pitchxKinAnx
 
Microsoft NetMeeting and Windows XP Video Conferencing vs
Microsoft NetMeeting and Windows XP Video Conferencing vsMicrosoft NetMeeting and Windows XP Video Conferencing vs
Microsoft NetMeeting and Windows XP Video Conferencing vsVideoguy
 
Automate Cloud and Application Security Deployments with Barracuda and Puppet...
Automate Cloud and Application Security Deployments with Barracuda and Puppet...Automate Cloud and Application Security Deployments with Barracuda and Puppet...
Automate Cloud and Application Security Deployments with Barracuda and Puppet...Claire Priester Papas
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Muhammad Farooq Hussain
 
Rocket BlueZone Datasheet
Rocket BlueZone DatasheetRocket BlueZone Datasheet
Rocket BlueZone DatasheetPM square
 

Similar to 50357 a enu-module00 (20)

Microsoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 DatasheetMicrosoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
 
Forefront tmg 2010 Network Inspection System & Custom Protocols
Forefront tmg 2010 Network Inspection System & Custom ProtocolsForefront tmg 2010 Network Inspection System & Custom Protocols
Forefront tmg 2010 Network Inspection System & Custom Protocols
 
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response HeadersUSENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
 
Real time operating systems (rtos) concepts 9
Real time operating systems (rtos) concepts 9Real time operating systems (rtos) concepts 9
Real time operating systems (rtos) concepts 9
 
On Premises Protection Technologies
On Premises Protection TechnologiesOn Premises Protection Technologies
On Premises Protection Technologies
 
50357 a enu-labmanual01
50357 a enu-labmanual0150357 a enu-labmanual01
50357 a enu-labmanual01
 
3. email relay fpe
3. email relay   fpe3. email relay   fpe
3. email relay fpe
 
Web Services Security Tutorial
Web Services Security TutorialWeb Services Security Tutorial
Web Services Security Tutorial
 
Microsoft Forefront - Online Security For Exchange Whitepaper
Microsoft Forefront -  Online Security For Exchange WhitepaperMicrosoft Forefront -  Online Security For Exchange Whitepaper
Microsoft Forefront - Online Security For Exchange Whitepaper
 
Firewall
FirewallFirewall
Firewall
 
Cr vs fortinet
Cr vs fortinetCr vs fortinet
Cr vs fortinet
 
DYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGESDYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGES
 
1. introduzione a TMG
1. introduzione a TMG1. introduzione a TMG
1. introduzione a TMG
 
Test
TestTest
Test
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
Open sso enterprise customer pitch
Open sso enterprise customer pitchOpen sso enterprise customer pitch
Open sso enterprise customer pitch
 
Microsoft NetMeeting and Windows XP Video Conferencing vs
Microsoft NetMeeting and Windows XP Video Conferencing vsMicrosoft NetMeeting and Windows XP Video Conferencing vs
Microsoft NetMeeting and Windows XP Video Conferencing vs
 
Automate Cloud and Application Security Deployments with Barracuda and Puppet...
Automate Cloud and Application Security Deployments with Barracuda and Puppet...Automate Cloud and Application Security Deployments with Barracuda and Puppet...
Automate Cloud and Application Security Deployments with Barracuda and Puppet...
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.
 
Rocket BlueZone Datasheet
Rocket BlueZone DatasheetRocket BlueZone Datasheet
Rocket BlueZone Datasheet
 

More from Bố Su

10135 a xb
10135 a xb10135 a xb
10135 a xbBố Su
 
10135 a xa
10135 a xa10135 a xa
10135 a xaBố Su
 
10135 a 11
10135 a 1110135 a 11
10135 a 11Bố Su
 
10135 a 10
10135 a 1010135 a 10
10135 a 10Bố Su
 
10135 a 09
10135 a 0910135 a 09
10135 a 09Bố Su
 
10135 a 08
10135 a 0810135 a 08
10135 a 08Bố Su
 
10135 a 07
10135 a 0710135 a 07
10135 a 07Bố Su
 
10135 a 06
10135 a 0610135 a 06
10135 a 06Bố Su
 
10135 a 05
10135 a 0510135 a 05
10135 a 05Bố Su
 
10135 a 04
10135 a 0410135 a 04
10135 a 04Bố Su
 
10135 a 03
10135 a 0310135 a 03
10135 a 03Bố Su
 
10135 a 02
10135 a 0210135 a 02
10135 a 02Bố Su
 
10135 a 01
10135 a 0110135 a 01
10135 a 01Bố Su
 
10135 a 00
10135 a 0010135 a 00
10135 a 00Bố Su
 
10135 a 12
10135 a 1210135 a 12
10135 a 12Bố Su
 
50357 a enu-module03
50357 a enu-module0350357 a enu-module03
50357 a enu-module03Bố Su
 
50357 a enu-module04
50357 a enu-module0450357 a enu-module04
50357 a enu-module04Bố Su
 

More from Bố Su (17)

10135 a xb
10135 a xb10135 a xb
10135 a xb
 
10135 a xa
10135 a xa10135 a xa
10135 a xa
 
10135 a 11
10135 a 1110135 a 11
10135 a 11
 
10135 a 10
10135 a 1010135 a 10
10135 a 10
 
10135 a 09
10135 a 0910135 a 09
10135 a 09
 
10135 a 08
10135 a 0810135 a 08
10135 a 08
 
10135 a 07
10135 a 0710135 a 07
10135 a 07
 
10135 a 06
10135 a 0610135 a 06
10135 a 06
 
10135 a 05
10135 a 0510135 a 05
10135 a 05
 
10135 a 04
10135 a 0410135 a 04
10135 a 04
 
10135 a 03
10135 a 0310135 a 03
10135 a 03
 
10135 a 02
10135 a 0210135 a 02
10135 a 02
 
10135 a 01
10135 a 0110135 a 01
10135 a 01
 
10135 a 00
10135 a 0010135 a 00
10135 a 00
 
10135 a 12
10135 a 1210135 a 12
10135 a 12
 
50357 a enu-module03
50357 a enu-module0350357 a enu-module03
50357 a enu-module03
 
50357 a enu-module04
50357 a enu-module0450357 a enu-module04
50357 a enu-module04
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

50357 a enu-module00

  • 1. Implementing Forefront Threat Management Gateway 2010 Course Introduction
  • 2. Introduction Name Company affiliation Title/function Job responsibility Previous experience with Microsoft ISA Server Expectations
  • 3. Facilities Class hours Building hours Parking Restrooms Meals Phones Messages Smoking Recycling
  • 4. About This Course Description Learning objectives Audience Prerequisites
  • 5. Course Description Prepares you to create security solutions based on Microsoft Forefront Threat Management Gateway 2010 (TMG) Covers the following usage scenarios: Secure Web Gateway Remote Access Gateway Secure Mail Relay Organized in 5 modules Delivered in 16 hours Instructor-led with 4 hands-on labs
  • 6. Course Objectives This course will enable you to: Understand the new features and the value proposition for Forefront TMG Explain how Forefront TMG protects clients and servers from Web- based threats Describe how Forefront TMG enable outside systems to secure connect to internal services and applications Describe how Forefront TMG integrates with Microsoft® Forefront™ Protection 2010 for Exchange Server and Microsoft® Exchange Server 2010 to protect an organization from mail-based threats Design an enterprise solution using Forefront TMG, considering availability, scalability, operations, and migration from an existing Microsoft® Internet Security and Acceleration Server (ISA) solution
  • 7. Target Audience Solution specialists and technical sales professionals with a focus on selling security solutions Architects and consultants involved in designing and deploying solutions based on Forefront TMG Technical account managers and premier field engineers who want to acquire in-depth knowledge of the design and deployment of Forefront TMG solutions
  • 8. Prerequisites Working knowledge of Active Directory® and Group Policy No specific Windows Server® 2008 R2 knowledge is required Good understanding of Windows® networking
  • 9. Course Outline – Day 1 Schedule Module or Activity Goals 9 :00 to Module 1: Forefront  Describe a brief history of the Microsoft edge security products. 11:00 AM Threat Management  Explain the current threat landscape and how this drove changes in Gateway 2010 the edge security strategy. Overview  List the new features in Forefront TMG and their value propositions.  Describe the key scenarios for Forefront TMG and how it differentiates from Microsoft® IAG/UAG.  Describe the SKU differentiation and subscription model.  Explain the installation requirements and install process for Forefront TMG. 11 :00 AM Lab 1: Installing  Install Forefront TMG to provide web and e-mail access between to noon Threat Management Contoso and the Internet. Gateway 2010  Perform an initial configuration of Forefront TMG using the Getting Started wizards. Noon to Lunch 1:00 PM 1:00 to Module 1: Secure  Describe the threats affecting enterprise users browsing the Web. 3:00 PM Web Gateway  Identify the key Forefront TMG features that address those threats (application proxy, granular access control, malware inspection, URL filtering, HTTPS inspection, NIS), and describe each of these features in detail. 3:00 to Lab 2: Configure  Create web access policies for Contoso users, including inspection 5:00 PM Secure Web Gateway of HTTPS sessions.  Modify web access policy to include protection from malware.  Investigate the Network Inspection System (NIS).
  • 10. Course Outline – Day 2 Schedule Module or Activity Goals 9:00 to Module 3: Remote  Understand how Forefront TMG can publish Web and non-Web services to 11:00 AM Access Gateway external users.  Explain the security features and benefits added by Forefront TMG in each of these publishing scenarios.  Discuss the new Forefront TMG features for virtual private networking, such as Secure Socket Tunneling Protocol (SSTP) and Network Access Protection (NAP). 11:00 AM to Lab 3: Remote  Use Web Publishing to publish Exchange Web Services Noon Access Gateway Noon to Lunch 1 :00 PM 1:00 to Module 4: Secure  Describe the mail threats facing organization, and explain what the key Forefront 2:00 PM Mail Relay TMG features are that address these threats.  Explain how Forefront TMG and Forefront Protection 2010 for Exchange Server are deployed together for premium antispam and antimalware protection.  Describe in detail how Forefront TMG performs spam filtering, malware filtering, and content filtering.  Describe the implementation process for this scenario and how the solution is configured. 2:00 to Lab 4: Secure Mail  Configure the Exchange Edge Transport role and Forefront Protection 2010 for 3:00 PM Relay Exchange Server on the Forefront TMG server to protect Internet e-mail.  Explore antispam and antimalware protection of Internet e-mail. 3:00 to Module 5: Forefront  Review the network, scalability, availability and operational considerations and 4:00 PM TMG Design and best practices when designing and deploying a solution based on Forefront Deployment TMG. Considerations  Identify the best practices when configuring clients to use Forefront TMG.  Describe migration procedures from ISA Server to Forefront TMG, and between the different versions of Forefront TMG.
  • 11. Classroom Setup Each student has their own virtualized lab environment Virtual machines: External Web server Firewall 8GB System Domain controller w/ Microsoft Hyper-V Mail server Collaboration server Windows client Forefront Protection Management server
  • 13. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Forefront, Windows and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.