CopyrightAbout the AuthorWe Want to Hear from You!IntroductionThe Target Audience of This BookThe Organization of This BookConventions Used in This BookPart I. Designing, Exploring, and Understanding ISA Server 2004Chapter 1. Introducing ISA Server 2004Understanding the Need for ISA Server 2004Detailing the Additional Advantages of ISA Server 2004Understanding the History of ISA Server 2004Exploring the New Features of ISA Server 2004Detailing Deployment Strategies with ISA Server 2004Augmenting an Existing Security Environment with ISA Server 2004Administering and Maintaining an ISA Server 2004 EnvironmentUsing ISA Server 2004 to Secure ApplicationsSummaryBest PracticesChapter 2. Installing ISA Server 2004Reviewing ISA Server 2004 PrerequisitesProcuring and Assembling ISA HardwareBuilding Windows Server 2003 as ISA's Operating SystemDetermining Domain Membership Versus Workgroup IsolationInstalling the ISA Server 2004 SoftwarePerforming Post-Installation ISA UpdatesSecuring the Operating System with the Security Configuration WizardSummaryBest PracticesChapter 3. Exploring ISA Server 2004 Tools and ConceptsExploring the ISA Server 2004 Management ConsoleConfiguring Networks with ISA Console Network Wizards and ToolsExploring Firewall Policy SettingsNavigating the Monitoring Node OptionsWorking with the Virtual Private Networks NodeExamining the Cache Node SettingsConfiguring Add-insExploring the ISA General NodeSummaryBest PracticesChapter 4. Designing an ISA Server 2004 EnvironmentPreparing for an ISA Server 2004 DesignUpgrading Existing ISA Server 2000 Systems to ISA Server 2004Determining the Number and Placement of ISA ServersPrototyping a Test ISA Server DeploymentPiloting an ISA Server DeploymentImplementing the ISA Server DesignDesigning ISA Server 2004 for Organizations of Varying SizesSummaryBest PracticesPart II. Deploying ISA Server 2004Chapter 5. Deploying ISA Server 2004 as a FirewallISA as a Full-Function Security FirewallMulti-networking with ISA Server 2004Defining ISA Firewall NetworksReviewing and Modifying Network RulesUnderstanding Firewall Policy RulesExamining Advanced ISA Firewall ConceptsSummaryBest PracticesChapter 6. Deploying ISA Server Arrays with ISA Server 2004 Enterprise EditionUnderstanding ISA Server 2004 Enterprise EditionDeploying the Configuration Storage Server (CSS)Setting Up Enterprise Networks and PoliciesCreating and Configuring ArraysInstalling and Configuring ISA Enterprise ServersConfiguring Network Load Balancing and Cache Array Routing Protocol (CARP) SupportSummaryBest PracticesChapter 7. Deploying ISA Server as a Reverse Proxy in an Existing Firewall DMZISA Server 2004 as a Security ApplianceDeploying Unihomed ISA Server 2004 Security AppliancesConfiguring Existing Firewalls to Utilize ISA Server 2004 Reverse ProxyPublishing and Securing Services in an Existing DMZUnderstanding Advanced ISA Security in Enterprise EnvironmentsSummaryBest PracticesChapter 8. Deploying ISA Server 2004 as a Content Caching ServerUnderstanding the Acceleration Component of the Internet Acceleration Server 2004Designing ISA Server 2004 Caching SolutionsEnabling ISA Server 2004 as a Web Caching ServerConfiguring Proxy ClientsSummaryBest PracticesChapter 9. Enabling Client Remote Access with ISA Server 2004 Virtual Private Networks (VPNs)Examining ISA Server 2004 VPN Capabilities and RequirementsDesigning an ISA Server 2004 VPN InfrastructureEnabling VPN Functionality in ISA ServerUtilizing RADIUS Authentication for VPN ConnectionsConfiguring ISA for Point-to-Point Tunneling Protocol (PPTP) VPN ConnectionsCreating Layer 2 Tunneling Protocol (L2TP) VPN Connections with ISACreating a Public Key Infrastructure (PKI) for L2TP with IPSec SupportUsing the Connection Manager Administration Kit (CMAK) to Automate VPN Client DeploymentEnabling ISA Server 2004 VPN QuarantineSummaryBest PracticesChapter 10. Extending ISA 2004 to Branch Offices with Site-to-Site VPNsUnderstanding Branch-Office Deployment Scenarios with ISA Server 2004Preparing ISA Servers for Site-to-Site VPN CapabilitiesConfiguring a Point-to-Point Tunneling Protocol (PPTP) Site-to-Site VPN Between Two Remote OfficesConfiguring a Layer 2 Tunneling Protocol (L2TP) Site-to-Site VPN Connection Between Two ISA Servers in Remote SitesConfiguring ISA 2004 to Integrate with Third-Party VPN Tunnel ProductsConfiguring Network and Firewall Rules Between ISA Site NetworksSummaryBest PracticesChapter 11. Understanding Client Deployment Scenarios with ISA Server 2004Outlining Client Access with ISA Server 2004Preparing an ISA Environment for the Firewall ClientInstalling the ISA Firewall ClientWorking with the ISA Firewall ClientSummaryBest PracticesPart III. Securing Servers and Services with ISA Server 2004Chapter 12. Securing Outlook Web Access (OWA) TrafficEnabling Secure Sockets Layer (SSL) Support for Exchange Outlook Web AccessSecuring Exchange Outlook Web Access with ISA Server 2004SummaryBest PracticesChapter 13. Securing Messaging TrafficUnderstanding the Need for Secure Mail AccessConfiguring ISA Server 2004 to Support OMA and ActiveSync Access to ExchangeConfiguring ISA Server to Secure RPC over HTTP(S) TrafficSecuring Exchange MAPI AccessSecuring POP and IMAP Exchange TrafficManaging and Controlling Simple Mail Transport Protocol (SMTP) TrafficSummaryBest PracticesChapter 14. Securing Web (HTTP) TrafficOutlining the Inherent Threat in Web TrafficPublishing and Customizing Web Server Publishing RulesConfiguring SSL-to-SSL Bridging for Secured WebsitesSecuring Access to SharePoint 2003 Sites with ISA 2004SummaryBest PracticesChapter 15. Securing RPC TrafficUnderstanding the Dangers of Remote Procedure Call (RPC) TrafficSecuring RPC Traffic Between Network SegmentsPublishing RPC Services with ISA Server 2004Using Network Monitor for Custom RPCCreating Server Publishing RulesSummaryBest PracticesPart IV. Supporting an ISA Server 2004 InfrastructureChapter 16. Administering an ISA Server 2004 EnvironmentDefining the Role of the ISA AdministratorDeploying a Role-Based Access Control Model for ISA Server 2004Delegating and Customizing Administrative Access to the ISA ConsoleAdministering an ISA Server RemotelyWorking with ISA Server 2004 Lockdown ModePerforming Advanced ISA AdministrationSummaryBest PracticesChapter 17. Maintaining ISA Server 2004Understanding the Importance of a Maintenance Plan for ISAUpdating ISA's Operating SystemPerforming Daily MaintenancePerforming Weekly MaintenancePerforming Monthly MaintenancePerforming Quarterly MaintenanceSummaryBest PracticesChapter 18. Backing Up, Restoring, and Recovering an ISA Server 2004 EnvironmentUnderstanding ISA Server's Backup and Recovery CapabilitiesExporting ISA Settings for BackupsImporting ISA Settings for RestoresAutomating ISA Server Export with Custom ScriptsUsing Traditional Backup and Restore Tools with ISA Server 2004SummaryBest PracticesChapter 19. Monitoring and Troubleshooting an ISA Server 2004 EnvironmentOutlining the Importance of ISA Monitoring and LoggingConfiguring ISA Logging and MonitoringLogging ISA TrafficMonitoring ISA from the ISA ConsoleGenerating Reports with ISA ServerMonitoring ISA Server 2004 Health and Performance with Microsoft Operations Manager (MOM)SummaryBest PracticesChapter 20. Documenting an ISA Server 2004 EnvironmentUnderstanding the Benefits of ISA Server DocumentationDocumenting the ISA Server 2004 DesignDeveloping Migration DocumentationCreating Administration and Maintenance Documentation for ISAPreparing Disaster Recovery DocumentationUnderstanding the Importance of Performance DocumentationWriting Training DocumentationSummaryBest PracticesIndex