Greetings! We’re pleased to announce that Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion was released to the printer today. The authors are Yuri Diogenes, Jim Harrison, Mohit Saxena from the Microsoft TMG Server Team, with Dr. Tom Shinder, and the book’s ISBN is 9780735626386.
The book will be available the second week of February, and we’ll post more book excerpts then. In the meantime, here is the book’s Foreword, by David B. Cross:
ForewordAs the Product Unit Manager for the Forefront Threat Management Gateway(TMG) 2010 release, I was able to take advantage of a unique opportunity tochange the industry regarding how we protect small business users and enterprisecustomers when connecting to the Internet in a world of ever-evolving threats,malicious software, and dynamic criminal activities. It was a challenge I could notpass up and I jumped at the opportunity to see how we could simplify the secureWeb gateway (SWG) experience for customers and still provide the flexibility andsecurity that hardcore security professionals have grown to love with the existingInternet Security and Acceleration (ISA) Server platform.
TMG has introduced a new era not only for Microsoft but also for the industryin how we create a comprehensive network protection solution for both small andlarge enterprise customers. Customers have told us that they love the Microsoftinfrastructure integrated firewall and proxy that allows configuration andmanagement using the tools and management infrastructure they are familiarwith, such as Active Directory. But as we saw the threats and the workforce evolve,we realized that our customers needed something more to protect their userswhen accessing the Internet.
I wish I could summarize the full set of capabilities and potential in a shortforeword for this book, but it proved to be impossible. The simple answer comesin the product name itself: Threat Management Gateway. The name deservedlyimplies the dynamic and integrated nature of the product and its extensiblecapability as it integrates with the Forefront Protection Suite. When you put it alltogether, the product really has six unique value propositions that emphasize ourcomprehensive approach to network protection:
In the end, the quality and the value proposition of the product speak forthemselves. Throughout the beta program, we have had more downloads andproduction deployments than all the other betas of the ISA platform combined.The breadth of the new features has driven new customers and new deploymentsnever possible with the ISA product line. On the firewall side, we have added keycomponents such as VoIP traversal (SIP), Enhanced NAT, and ISP Link Redundancy.Combined with our NAP (Network Access Protection) integration with the VPNfunctionality, the firewall and remote access capabilities are richer than ever.On the Web client protection area, we now have integrated URL filtering, HTTPanti-virus/spyware scanning, and HTTPS forward inspection. The new securee-mail relay deployment option enables a hardened edge–based anti-virusand anti-spam solution not previously available. And last but not least, the fullyintegrated and new Forefront Network Inspection System (NIS) has changedthe game of network intrusion prevention and detection. Not only does the NISprovide the capability for administrators to provide threat management in theface of zero-day attacks, but it also enables security assessment and responseswhen deployed in conjunction with the Forefront Protection Suite.
What’s next for the future of secure Web gateways and the threat landscape?If I were to be an oracle and predict the future, I would expect first that the trendof more complex malware and malicious attacks will continue to grow in volumeand in criminal intent. I would also suspect that we will see a demand from themarketplace for further integration of information protection and control (IPC) withaccess and protection. We will see consolidation not only of solutions, but we’ll alsosee the management and policy capabilities being integrated and unified acrosssolution verticals. I believe TMG 2010 will be a product foreshadowing the futurewhen it comes to network and virtualized datacenter protection.
In summary, this book is a must-have for the Forefront Threat ManagementGateway administrator—it embodies the core of the product team developmentknowledge, the best practices from the Microsoft consultants around the world,and the learning from our customer deployments to date, and it distills this allinto a one-stop resource kit of knowledge. Jim Harrison is known throughoutMicrosoft and the broader industry as the foremost ISA—and now TMG—expert.His in-depth understanding of the product internals combined with real-worlddeployment and operational experience provide a perspective unlike any otherexpert in the community. Yuri Diogenes and Mohit Saxena have not only been onthe front lines of the top ISA deployments around the world, but have also beenon the forefront (no pun intended) of the TMG beta program. Their firsthandguidance and best practices will help you ensure a smooth and easy deploymentby avoiding mistakes in advance and suggesting the most secure configurationfrom the start. Tom Shinder, a recognized Microsoft security professional andwidely known ISA expert, brings his extended ISA experience to bear as a valuedtechnical reviewer for this book.
The availability of this book helps to achieve the goal that we set with theoriginal inception of the TMG project: to enable customers to deploy protectioneasily in a cost-effective and manageable way to achieve their security andapplication-protection requirements in an ever-changing threat landscape.I believe we have achieved that goal with our upcoming release and withsecurity experts such as Jim, Yuri, and Mohit evangelizing the knowledge.
David B. CrossProduct Unit ManagerMicrosoft Corporation
regarding recent news about
Save 40% on all Microsoft Press books and 50% on e-books on microsoftpress.oreilly.com
And when will be available an e-book version?