Chapter 8. Deploying ISA Server 2004 as a Content Caching ServerUnderstanding the Acceleration Component of the Internet Acceleration Server 2004Designing ISA Server 2004 Caching SolutionsEnabling ISA Server 2004 as a Web Caching ServerConfiguring Proxy ClientsSummaryBest PracticesChapter 9. Enabling Client Remote Access with ISA Server 2004 Virtual Private Networks (VPNs)Examining ISA Server 2004 VPN Capabilities and RequirementsDesigning an ISA Server 2004 VPN InfrastructureEnabling VPN Functionality in ISA ServerUtilizing RADIUS Authentication for VPN ConnectionsConfiguring ISA for Point-to-Point Tunneling Protocol (PPTP) VPN ConnectionsCreating Layer 2 Tunneling Protocol (L2TP) VPN Connections with ISACreating a Public Key Infrastructure (PKI) for L2TP with IPSec SupportUsing the Connection Manager Administration Kit (CMAK) to Automate VPN Client DeploymentEnabling ISA Server 2004 VPN QuarantineSummaryBest PracticesChapter 10. Extending ISA 2004 to Branch Offices with Site-to-Site VPNsUnderstanding Branch-Office Deployment Scenarios with ISA Server 2004Preparing ISA Servers for Site-to-Site VPN CapabilitiesConfiguring a Point-to-Point Tunneling Protocol (PPTP) Site-to-Site VPN Between Two Remote OfficesConfiguring a Layer 2 Tunneling Protocol (L2TP) Site-to-Site VPN Connection Between Two ISA Servers in Remote SitesConfiguring ISA 2004 to Integrate with Third-Party VPN Tunnel ProductsConfiguring Network and Firewall Rules Between ISA Site NetworksSummaryBest PracticesChapter 11. Understanding Client Deployment Scenarios with ISA Server 2004Outlining Client Access with ISA Server 2004Preparing an ISA Environment for the Firewall ClientInstalling the ISA Firewall ClientWorking with the ISA Firewall ClientSummaryBest PracticesPart III. Securing Servers and Services with ISA Server 2004Chapter 12. Securing Outlook Web Access (OWA) TrafficEnabling Secure Sockets Layer (SSL) Support for Exchange Outlook Web AccessSecuring Exchange Outlook Web Access with ISA Server 2004SummaryBest PracticesChapter 13. Securing Messaging TrafficUnderstanding the Need for Secure Mail AccessConfiguring ISA Server 2004 to Support OMA and ActiveSync Access to ExchangeConfiguring ISA Server to Secure RPC over HTTP(S) TrafficSecuring Exchange MAPI AccessSecuring POP and IMAP Exchange TrafficManaging and Controlling Simple Mail Transport Protocol (SMTP) TrafficSummaryBest PracticesChapter 14. Securing Web (HTTP) TrafficOutlining the Inherent Threat in Web TrafficPublishing and Customizing Web Server Publishing RulesConfiguring SSL-to-SSL Bridging for Secured WebsitesSecuring Access to SharePoint 2003 Sites with ISA 2004SummaryBest PracticesChapter 15. Securing RPC TrafficUnderstanding the Dangers of Remote Procedure Call (RPC) TrafficSecuring RPC Traffic Between Network SegmentsPublishing RPC Services with ISA Server 2004Using Network Monitor for Custom RPCCreating Server Publishing RulesSummaryBest PracticesPart IV. Supporting an ISA Server 2004 InfrastructureChapter 16. Administering an ISA Server 2004 EnvironmentDefining the Role of the ISA AdministratorDeploying a Role-Based Access Control Model for ISA Server 2004Delegating and Customizing Administrative Access to the ISA ConsoleAdministering an ISA Server RemotelyWorking with ISA Server 2004 Lockdown ModePerforming Advanced ISA AdministrationSummaryBest PracticesChapter 17. Maintaining ISA Server 2004Understanding the Importance of a Maintenance Plan for ISAUpdating ISA''s Operating SystemPerforming Daily MaintenancePerforming Weekly MaintenancePerforming Monthly MaintenancePerforming Quarterly MaintenanceSummaryBest PracticesChapter 18. Backing Up, Restoring, and Recovering an ISA Server 2004 EnvironmentUnderstanding ISA Server''s Backup and Recovery CapabilitiesExporting ISA Settings for BackupsImporting ISA Settings for RestoresAutomating ISA Server Export with Custom ScriptsUsing Traditional Backup and Restore Tools with ISA Server 2004SummaryBest PracticesChapter 19. Monitoring and Troubleshooting an ISA Server 2004 EnvironmentOutlining the Importance of ISA Monitoring and LoggingConfiguring ISA Logging and MonitoringLogging ISA TrafficMonitoring ISA from the ISA ConsoleGenerating Reports with ISA ServerMonitoring ISA Server 2004 Health and Performance with Microsoft Operations Manager (MOM)SummaryBest PracticesChapter 20. Documenting an ISA Server 2004 EnvironmentUnderstanding the Benefits of ISA Server DocumentationDocumenting the ISA Server 2004 DesignDeveloping Migration DocumentationCreating Administration and Maintenance Documentation for ISAPreparing Disaster Recovery DocumentationUnderstanding the Importance of Performance DocumentationWriting Training DocumentationSummary