Microsoft Forefront Security Administration GuideBy
- Jesse Varsalone, Jesse Varsalone is a Cisco Certified Academy Instructor and holds the CCNA certification. Jesse is also a CISSP, MCT, MCSE, and currently works as a Computer Forensics Senior Professional.
Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides end-to-end security stretching from Web servers back to the desktop. This book will provide system administrators familiar with Syngress' existing Microsoft networking and security titles with a complete reference to Microsoft's flagship security products.
Network administrators, security professionals, Webmasters, and database administrators responsible for administering and securing Microsoft networks, operating systems, applications, mail server, Web servers, firewalls, and databases.
Paperback, 800 Pages
Published: February 2008
- Part I: Forefront Client SecurityChapter 1: Introducing Client SecurityChapter 2: Securing the DesktopChapter 3: Remote Networking and CommunicationsPart II: Forefront Security for Exchange Server Chapter 4: Securing Client AccessChapter 5: Locking Down Exchange ServerChapter 6: Backups and Disaster RecoveryPart III: Forefront Security for SharePoint Chapter 7: Securing Sharepoint ServersChapter 8: Secure Communications and Remote AccessChapter 9: Defending your DataPart IV: Forefront Server Security Management Console Chapter 10: Introduction to the Server Security Management ConsoleChapter 11: Exploring the InterfaceChapter 12: Managing SQL Server and Log FilesPart V: Microsoft AntigenChapter 13: Defining Malware DefensesChapter 14: Securing the PerimeterChapter 15: Correlating the ResultsPart VI: Microsoft ISA Server 2006Chapter 16: Deploying ISA 2006 in the EnterpriseChapter 17: Building a SSL VPNChapter 18: Integrating ISAS Server with Exchange ServerPart VII: Intelligent Application Gateway 2007Chapter 19: Deploying Application Gateway 2007Chapter 20: Defending your ApplicationsChapter 21: Backup and Disaster Recovery