A new ebook from Yuri Diogenes and Dr. Thomas W. Shinder is now available. One of three ebooks they have written about deploying Forefront, Deploying Microsoft Forefront Threat Management Gateway 2010 (ISBN 9780735648920) presents useful best practices for deploying TMG. Yuri and Tom give a nice overview of what you can expect in the book’s introduction, which is reprinted here.
When we began this project, our intent was to create a real world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Threat Management Gateway (TMG) 2010. We hope you find that we have achieved that goal. We’ve also included the main deployment scenarios for Forefront TMG, and we take a deep dive into the installation process from the RTM version to the Service Pack 1 version.
This book provides administrative procedures, tested design examples, quick answers, and tips. In addition, it covers some of the most common deployment scenarios and describes ways to take full advantage of the product’s capabilities. This book covers pre-deployment tasks, use of Forefront TMG in a Secure Web Gateway Scenario, software and hardware requirements, and installation and configuration, using best practice recommendations.
Who Is This Book For?
Deploying Microsoft Forefront Threat Management Gateway 2010 covers the planning and deployment phases for this product. This book is designed for:
■ Administrators who are deploying Forefront TMG
■ Administrators who are experienced with Windows Server 2008 in general and with Windows networking in particular
■ Current ISA Server administrators
■ Administrators who are new to Forefront TMG
■ Technology specialists, such as security administrators and network administrators
Because this book is limited in size and we want to provide you the maximum value, we assume a basic knowledge of Windows Server 2008 and Windows networking. These technologies are not discussed in detail, but this book contains material on both of these topics that relates to Forefront TMG administrative tasks.
How Is This Book Organized?
Deploying Microsoft Forefront Threat Management Gateway 2010 is written to be a deployment guide and also to be a source of architectural information related to the product. The book is organized in such a way that you can follow the steps to plan and deploy the product. The steps are based on a deployment scenario for the company Contoso. As you go through the steps, you will also notice tips for best practices implementation. At the end of each chapter, you will see an “Administrator’s Punch List,” in which you will find a summary of the main administrative tasks that were covered throughout the chapter. This is a quick checklist to help you review the main deployment tasks.
The book is organized into three chapters: Chapter 1, “Understanding Forefront Threat Management Gateway 2010,” introduces you to the core concepts of firewalls, perimeter protection, and proxies and guides you through the use of Forefront TMG as a secure web gateway. Chapter 2, “Installing and Configuring Forefront Threat Management Gateway 2010,” guides you through the product’s installation and configuration. Chapter 3, “Deploying Forefront 2010 Service Pack 1,” covers the new features of Service Pack 1 and describes how to install and configure those features.
We really hope you find Deploying Microsoft Threat Management Gateway 2010 useful and accurate. We have an open door policy for email at firstname.lastname@example.org, and you can contact us through our personal blogs and Twitter accounts:
■ http://blogs.technet.com/yuridiogenes and http://blogs.technet.com/tomshinder
■ https://twitter.com/yuridiogenes and https://twitter.com/tshinder