ISAserver.org - Monthly Article Update

  • From: "ISAserver.org" <info@xxxxxxxxxxxxx>
  • To: "isalist@xxxxxxxxxxxxx" <isalist@xxxxxxxxxxxxx>
  • Date: Fri, 01 Oct 2004 15:31:28 +0200

ISAserver.org - Monthly Article Update

Hi ISAlist,

New articles added to ISAserver.org last month:


Title: Amy Babinchak’s ISA/SBS Series: How to Synchronize SBS2003 Premium with 
an External Time Source
Author: Thomas Shinder
Summary: Is the Windows Time Service on the SBS server giving your headaches? 
If so, Amy Babinchak has the cure! Check out this article for detailed advice 
on how to configure the SBS Windows Time Service and the ISA firewall to allow 
Time Service access to Internet Time Servers
Link: http://www.ISAserver.org/articles/sbstimesync.html

Title: Configure ISA to enable a DNS intrusion detection filter
Author: Ricky M. Magalhaes
Summary: This article will focus on the capabilities of ISA when enabling 
intrusion detection and the importance thereof.
Link: http://www.ISAserver.org/tutorials/Configure-ISA-Enable-DNS-ID-filter.html

Title: Using the Browser on the ISA Firewall (2004)
Author: Thomas Shinder
Summary: One of the most popular requests I see on the ISAserver.org Web boards 
and mailing list is "how do I use the browser on my ISA firewall". This is a 
painful question for me to hear. In an ideal firewall security environment, you 
would never use the Web browser on the firewall. However, I work through my 
pain in this article and show you how to run IE on the ISA firewall itself.
Link: http://www.ISAserver.org/articles/2004browseronfirewall.html

Title: Opening MSN through ISA server
Author: Ricky M. Magalhaes
Summary: In this tutorial I will show you how to open ISA up so that MSN can 
pass through it and so that you can communicate with other MSN clients on the 
internet.  Please bear in mind that MSN should not be opened up if there is any 
chance of abuse that can take place, whilst using it you can potentially put 
your organization at risk.
Link: http://www.ISAserver.org/articles/MSN-ISAserver.html

Title: Configuring Remote Access VPN Servers in a Back to Back ISA Firewall 
Configuration
Author: Thomas Shinder
Summary: Want to publish your PPTP, L2TP/IPSec, and IPSec tunnel mode VPN 
servers using the new ISA firewall? No problem! Check out this article for the 
details on how to do it today. Guess what? The VPN server you publish doesn't 
even need to be a Windows VPN server! Find out how to do it here.
Link: http://www.ISAserver.org/articles/2004pubvpn.html

Title: Configuring DHCP and DNS for ISA automatic discovery
Author: Ricky M. Magalhaes
Summary: In this tutorial I will highlight the advantages of having automatic 
configuration of your ISA web proxy and firewall clients. In a rollout of more 
than 50 clients this can prove as an incredible time saver helping you to roll 
out as soon as a user logs into a machine that has internet explorer already 
preinstalled.
Link: 
http://www.ISAserver.org/tutorials/Configuring-DHCP-DNS-automatic-discovery.html

Title: ISAserver.org New Article Alerts for your PC or Website Using our RSS 
Feed!
Author: Stephen Chetcuti
Summary: It is now possible to retrieve instant updates of the latest articles 
posted to all our websites by using the recently launched RSS feed service! 
Simply retrieve updates for your personal use or enhance your own website by 
providing your visitors with convenient access to our highly rated content as 
it's released.
Link: http://www.ISAserver.org/news/ISAserver-RSS-Feed.html

Title: Strong Outbound Access Control using the ISA Firewall (2004): Using 
Scripts to Populate URL Sets and Domain Name Sets
Author: Thomas Shinder
Summary: One of the ISA firewall’s strong suits is its exceptional stateful 
application layer inspection. In addition to performing the basic task of 
stateful filtering (which even a simple ‘hardware’ firewall can do), the ISA 
firewall’s strong application layer inspection feature set allows the ISA 
firewall to actually understand the protocols passing though the firewall. In 
contrast to traditional second generation hardware firewalls, the ISA firewall 
represents a third generation firewall that is not only network aware, but 
application protocol aware. This article shows you how to leverage the ISA 
firewalls stateful application layer inspection by using an automated approach 
to populating Domain Name Sets and URL Sets using scripts.
Link: http://www.ISAserver.org/articles/2004domainseturlset.html

Title: Allowing Intradomain Communications through the ISA Firewall (2004)
Author: Thomas Shinder
Summary: The new ISA firewall’s enhanced support for directly attached DMZs has 
led to a lot of questions on how to allow intradomain communications through 
the ISA firewall from one network to another. This is a great question because 
you can now create multiple directly attached perimeter networks and allow 
controlled access to and from those perimeter networks. You can now safely put 
domain member machines on these DMZ segments to support a variety of new 
scenarios, such as dedicated network services segments that enforce domain 
segmentation. This article shows you have to create an Access Rule that allows 
the required protocols through the ISA firewall.
Link: http://www.ISAserver.org/articles/2004perimeterdomain.html

Title: Network Behind A Network (2004) - v1.1
Author: Thomas Shinder
Summary: A lot of ISA firewall admins are having a tough time wrapping their 
heads around the network behind a Network concept. Clint Denham takes the veil 
off this mysterious concept and help us get our network within a Network 
configurations up and running.
Link: http://www.ISAserver.org/articles/2004netinnet.html





Visit the Subscription Management (http://newsletter.isoftmarketing.com/) 
section to unsubscribe.
ISAserver.org is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@xxxxxxxxxxxxx

Copyright © ISAserver.org 2004. All rights reserved.



Other related posts: