Secure Remote and Outbound Internet Access Using ISA Server 2006 Web Proxy

Size: px
Start display at page:

Download "Secure Remote and Outbound Internet Access Using ISA Server 2006 Web Proxy"

Transcription

1 Secure Remote and Outbound Internet Access Using ISA Server 2006 Web Proxy White Paper Published: June 2006 For the latest information, please see 1

2 Table of Contents Introduction... 3 Meeting the Challenges of Secure Remote Access... 4 Assuring Security and Compliance Managers that Remote Access Connections Are Secure.. 4 ISA Server 2006 Solutions for Assuring Security and Compliance Managers that Remote Access Connections Are Secure... 5 HTTP Filter... 5 Pre-Authentication Support for Multiple Authentication Mechanisms... 6 SSL Bridging... 6 Real-Time Alerting... 6 Detailed Logging and Reporting... 7 Built-in Configuration Support for Microsoft Exchange Web Services... 7 Built-in Configuration Support for Windows SharePoint Services... 7 Comprehensive Support for Application-Layer Inspection Enhancement... 8 Performance Issues Due to Remote Access Connectivity... 8 ISA Server 2006 Solutions for Performance Issues Due to Distributed Workforce Remote Access Connectivity... 9 Web Proxy Caching... 9 SSL Bridging Web Farm Load Balancing ISA Server 2006 Solutions for Simplifying Deployment of an Application Security and Acceleration Solution ISA Server 2006 Solutions for Reducing Cost of Network Operations Meeting the Challenges of Secure Employee Internet Access and Increasing Employee Productivity Securing Employee Access to the Internet ISA Server 2006 Solutions for Employee Access to the Internet HTTP Filter Per-Site Access Controls Per-Group Access Controls Time of Day Access Controls Content Type Access Controls Comprehensive Logging and Reporting Increasing Employee Productivity by Accelerating the Internet ISA Server 2006 Solutions for Increasing Employee Productivity High Performance In-Memory and Disk Web Cache Cache Rules Content Download Jobs Web Proxy Chaining Rules HTTP Compression Quality of Service Controls for Web Connections Integrated Network Load Balancing Summary

3 Introduction Almost all companies today have a connection to the Internet that provides access to information on Web servers at partner and customer sites, as well as access to Web content at main offices from branch locations. Although the Internet and branch office networks provide employees the ability to quickly share and act on information, they also carry the risk of sharing and spreading dangerous exploits and attacks from hackers and malicious mobile code. Today s businesses must have a way to allow secure access to corporate Web servers for users located outside the enterprise network. The same solution must protect users on the company network from downloading information dangerous to employees, the company, and its information technology (IT) systems. A popular and powerful solution to the problems of secure Web access is a Web proxy. Web proxy devices help enable a company to control the flow of information moving over Web channels using the Hypertext Transfer Protocol (HTTP), Secure HTTP (HTTPS), and File Transfer Protocol (FTP) application protocols. Web proxy servers act as intermediaries between client and server. The Web proxy server can inspect the content of all Web communications and help prevent suspicious and potentially dangerous communications and code from traversing the corporate network edge. Web proxy devices can speed access to business content, make content available when the Web server is unavailable, and reduce bandwidth costs by employing Web caching technologies. A caching Web proxy server stores content closer to the user and sends it to the user without needing to pass requests to a Web server located across an unreliable Internet connection or a bandwidth-constrained dedicated wide area network (WAN) link. Microsoft Internet Security and Acceleration (ISA) Server 2006 is a Web proxy server that addresses these modern business problems. ISA Server helps provide secure remote access to information contained on corporate Web servers. ISA Server helps to secure and control Internet access for employees located on the corporate network. You can reduce total cost of network operations by deploying the ISA Server 2006 Web proxy server and improve employee productivity by using ISA Server 2006 Web proxy caching. Examples of how the ISA Server 2006 Web proxy can increase security and performance include: Pre-authenticating users before allowing access to corporate Web servers. Pre-authorizing users before allowing access to company data resources. Checking for potential attack code in the HTTP Web connection. Blocking access to sensitive corporate information. Caching Web content to improve the end-user experience. Controlling which content corporate users can connect to over the Internet. ISA Server 2006 provides two general types of Web proxy services: forward proxy and reverse proxy. A forward proxy intervenes between connections from users on the corporate network when they access information located outside the corporate intranet. A reverse proxy coordinates Web communications between users on the Internet and information located on the corporate network. The same device can provide both forward and reverse proxy services. This white paper explores how ISA Server 2006 provides enhanced security and application acceleration by acting as both forward and reverse Web proxy for your corporate network. In particular, this white paper discusses how ISA Server 2006 meets the challenges of a distributed workforce and controls access to Internet content for users located on the corporate network. 3

4 Meeting the Challenges of Secure Remote Access Companies are seeking more ways to utilize existing business intelligence to gain an advantage over the competition. To gain a competitive advantage, firms are seeking ways to position existing data assets so that the corporate workforce can access information from anywhere in the world. This anywhere access increases business agility by providing remote access to information hosted on the corporate network, which may be unavailable when employees leave the company facilities. Remote access refers to the ability to access information hosted on corporate servers even when users and their computers are not physically located on the corporate network. Remote access provides an increased array of options for positioning employees, while still making corporate information available to these employees. Examples include: Telecommuters With increased availability and adoption of high-speed Internet connections comes the home working option. Companies can benefit from reduced infrastructure costs by enabling telecommuting on a full-time or part-time basis. Sales force and executives Sales personnel require access to information on corporate servers. Mobile workers require access to Microsoft Office Word documents, Microsoft PowerPoint presentations, database information, and more. Executives also require real-time access to information when visiting with customers and partners. Corporate partners Companies forging strategic relationships with other firms need a secure and reliable method to share proprietary information. Shared parts lists, price quotes, order information, and other data enable businesses to quickly take advantage of time-sensitive opportunities. Secure remote access to corporate applications and data is a key factor to success in today s business environment. To take advantage of secure remote access, you need to rethink the definition of the corporate network. The corporate network is typically thought of as a separate entity, physically partitioned from the Internet, which is not secure, populated by hackers, malicious users, and other potential intruders. However, with the introduction of remote access connections, it is now clear that the boundaries of the corporate network extend to the entire Internet. There are four primary problems that need to be solved to take full advantage of the benefits provided by remote access to corporate data: Assure security and compliance managers that remote access connections are secure. Solve performance issues due to connections made by a remote workforce. Simplify deployment of an application security and acceleration solution. Reduce the cost of network operations related to remote connections. Assuring Security and Compliance Managers that Remote Access Connections Are Secure Although remote access connections can provide businesses with a strategic advantage, these same connections can increase the risk of information leaks and data theft. Most businesses have security and compliance concerns related to remote access connections because attackers can potentially use the same mechanisms employees use to legitimately access corporate information. 4

5 ISA Server 2006 addresses the following concerns of security and compliance managers: Prevent dangerous connections from hackers and intruders from reaching corporate Web sites Hackers on the Internet can access corporate information through the same channel provided for employee access. You need to stop potential attacks against your Web sites before intruders reach them. The ISA Server 2006 Web proxy is able to inspect all connections to corporate Web sites and stop potentially dangerous connections at the ISA Server computer. This allows employees to access the corporate data they need while stopping attacks before they ever reach the Web server. Prevent anonymous connections to corporate Web servers Many companies allow connections to corporate Web servers hosting Microsoft Exchange Server and Microsoft Office SharePoint Portal Server by configuring corporate firewalls to allow Internet-based users access to those servers. This can put the company s data at risk because the firewall is not able to identify the user before allowing the connection. This allows anonymous attackers to perform password, denial of service, and similar attacks against the Web server. When ISA Server 2006 is used as a Web proxy to protect the corporate Web sites, users must first successfully prove their identity before the connection to the corporate server is allowed. In addition, even after the users successfully prove their identities, only those users who have been granted permission to access those information resources are allowed to connect to the corporate server. SharePoint Portal Server is one example of a type of Web server that benefits from this type of protection. Prevent negative compliance impact due to remote user activity Corporate compliance officers need information about who connected to company data, when they accessed company data, and what they did when connected to the corporate network through a remote access connection. The ISA Server 2006 Web proxy helps solve compliance issues by comprehensively logging extensive user information for all connections made to corporate Web servers through the proxy. Log data can be used to create comprehensive reports on remote user activity. The ISA Server 2006 Web proxy logs can be queried to provide detailed information about resource usage and user activity. ISA Server 2006 Solutions for Assuring Security and Compliance Managers that Remote Access Connections Are Secure ISA Server 2006 includes a number of technologies that address the problems faced by security and compliance managers. These include: HTTP filter Pre-authentication support for multiple authentication mechanisms Secure Sockets Layer (SSL) bridging (SSL termination and initiation) Real-time alerting Detailed logging and reporting Built-in configuration support for Microsoft Exchange Web services Built-in configuration support for Microsoft Windows SharePoint Services Comprehensive support for application-layer inspection enhancement HTTP Filter Using the HTTP filter, you can view virtually all components of the Web traffic that is moving through the ISA Server computer, and make decisions about the relative risk those connections pose to the corporate Web servers. If the HTTP filter detects that a potential attack is being 5

6 launched against the corporate Web servers, the ISA Server 2006 Web proxy may be able to automatically block those connections. The threat of data theft or destruction is stopped at the Web proxy. In addition to the possibility of blocking incoming and outgoing attacks, the HTTP filter can be configured to block dangerous programs, such as some types of instant messaging, peerto-peer file sharing, and Voice over IP (VoIP) applications. The HTTP filter can be enabled for all Web connections made through the ISA Server 2006 Web proxy. There is a secure default configuration. The ISA Server 2006 administrator can customize the HTTP filter to provide specialized security for corporate Web servers, such as those hosting Microsoft Office Outlook Web Access, Exchange ActiveSync, Outlook 2003 remote procedure call (RPC) over HTTP, and Windows SharePoint Services. Pre-Authentication Support for Multiple Authentication Mechanisms Most organizations set access controls on corporate data. Access controls enable users to see information they require to perform their work, but prevent them from seeing sensitive or extraneous information. Access controls are typically set on servers throughout the organization, such as on file servers, Web servers, FTP servers, servers, and data collaboration servers. Because of the risk posed by anonymous attackers who can be located anywhere on the Internet, it s vital that users first identify themselves to the Web proxy before being allowed to gain access to corporate data. Pre-authentication is an access control method whereby the ISA Server 2006 Web proxy successfully identifies the user before allowing the connection to the corporate Web server. Access control includes more than authentication. Robust access control includes both authentication and authorization. The ISA Server 2006 Web proxy also pre-authorizes connections to the company s Web sites. Pre-authorization enables you to control which users are able to connect to company data through remote access connections, even if they have successfully identified themselves (authenticated) with the ISA Server 2006 Web proxy. SSL Bridging Secure Sockets Layer (SSL) is an encryption protocol used to secure HTTP traffic from eavesdropping or tampering. Intruders are unable to access the contents of an SSL secured HTTP payload because they are not able to decrypt the HTTP message. Although SSL secured Web connections provide privacy by encrypting the user name, password, and contents of the Web traffic, traditional network firewalls cannot protect corporate Web servers from attacks that might remain hidden inside the SSL encrypted content. Because the firewall can t read the contents of the connection, it can t recognize malicious content. The ISA Server 2006 Web proxy can correct the security weaknesses inherent in traditional network firewalls by decrypting and inspecting the contents of an SSL Web session. ISA Server 2006 can accomplish this by performing SSL bridging. SSL bridging allows the ISA Server 2006 Web proxy to decrypt the SSL traffic, inspect it for information that might be consistent with an attack, and drop the connection if it is suspicious. If it appears that the content is not harmful, ISA Server re-encrypts the content and forwards it to the appropriate Web server. Real-Time Alerting Network security officers and administrators need to know in real time the current status of the ISA Server 2006 Web proxy. Real-time alerts provide critical information required to respond to attacks, performance problems, system hardware failures, and Web proxy service issues. ISA Server 2006 administrators can receive real-time alerts about Web proxy server status via , pager, or system-wide alerts. ISA Server 2006 is fully supported by Microsoft Operations Manager (MOM) and enables ISA Server to be part of a centrally managed services environment. The ISA Server 2006 MOM pack provides the MOM server with the intelligence required to detect and interpret configuration, management, and security issues. It then alerts ISA Server 2006 and MOM administrators using MOM alerting. 6

7 For more information about Microsoft Operations Manager, see the MOM home page at the Microsoft Operations Manager Web site. Detailed Logging and Reporting Security and compliance managers must have detailed information about information users access through remote access connections. Detailed logging should include the name of the user accessing corporate information, the day and time the user accessed information, and the nature of the information that the user accesses during the remote access connection. This data must be available for network audits, forensic analysis, and industry standards compliance requirements. ISA Server 2006 Web proxy logging and reporting provides this information and much more. The default log settings enable the ISA Server 2006 Web proxy to gather detailed information about user activity, and then create reports using the ISA Server 2006 built-in reporting engine. Reports can be customized to provide summary information about user activity when connecting to the corporate Web server. Third-party reporting add-ins can be used to provide more targeted information about user activity through the ISA Server 2006 Web proxy. For more information about third-party enhancements to ISA Server 2006 reporting, see the Microsoft ISA Server 2006 Partners Web site. Built-in Configuration Support for Microsoft Exchange Web Services Configuring Web proxy devices to provide secure remote access to Microsoft Exchange Web services can be a complex undertaking. There are many important details involved with the configuration. A single error can make the Exchange Server Web services inaccessible or even allow connections that are not secure to the Exchange Web services. ISA Server 2006 was built to provide secure remote access to Exchange Server. To ensure that ISA Server 2006 Web proxy is configured in a correct and secure fashion, a powerful Mail Server Publishing Wizard automates the complex task that allows secure remote access connections to Exchange. The Publish Exchange Web Client Access Wizard configures ISA Server 2006 to provide secure remote access to the following Exchange Web services: Outlook Web Access Used by Web browsers to provide a rich user experience comparable to the full Outlook client application. Outlook Mobile Access Used by smart phones to enable access to user mailboxes. Exchange ActiveSync Used by Windows Mobile -enabled personal digital assistants and phones to provide an Outlook-like user experience. Outlook RPC over HTTP Used by Outlook 2003 to provide the full Outlook user experience even when the user is located behind a restrictive firewall. ISA Server 2006 configuration wizards make it easy for the administrator to quickly create rules providing secure and reliable access to all the Exchange Web services and do so in a minimum amount of time without high training costs. Built-in Configuration Support for Windows SharePoint Services SharePoint Portal Server enables enterprises to develop an intelligent portal that seamlessly connects users, teams, and knowledge so that people can take advantage of relevant information across business processes to help them work more efficiently. SharePoint Portal Server provides an enterprise business solution that integrates information from various systems into one solution 7

8 through single sign on (SSO) and enterprise application integration capabilities, with flexible deployment options and management tools. Providing remote access to SharePoint Portal Server can be a security and compliance challenge because of the complexities inherent in configuring a Web proxy to support secure remote access to SharePoint Portal Server computers. Because of the highly confidential nature of the information stored on corporate SharePoint Portal Server computers, exceptional care is required when configuring the Web proxy because a single error can compromise data privacy and integrity. ISA Server 2006 was built to support secure and reliable remote access connections to SharePoint Portal Server. The SharePoint Portal Server Web Publishing Wizard, which is included with ISA Server 2006, makes it a simple task for any Windows-savvy administrator to quickly, accurately, and securely enable remote access connections to a company s SharePoint Portal Server information stores. Comprehensive Support for Application-Layer Inspection Enhancement Unlike conventional, stateful packet inspection only firewalls, the ISA Server 2006 Web proxy makes decisions that are more sophisticated than just allowing or denying by performing application-layer inspection. Application-layer inspection is an ISA Server 2006 feature that enables the Web proxy to make assessments about the validity and safety of the Web communications moving through the ISA Server Web proxy. One example of the ISA Server 2006 Web proxy application-layer inspection feature set is the HTTP filter, described earlier in this document. ISA Server 2006 includes strong application-layer inspection mechanisms. ISA Server 2006 is also a flexible and extensible solution so that you can significantly enhance application-layer inspection. Using third-party ISA Server 2006 Web proxy add-in filters, you can: Inspect Web traffic for viruses. Prevent malicious applications from tunneling through a normal Web connection. Enable ISA Server 2006 to inspect XML traffic. Perform additional security tasks. Extensions to the ISA Server 2006 Web proxy s application-layer inspection feature set can be found at the Microsoft ISA Server 2006 Partner Web site. Performance Issues Due to Remote Access Connectivity Employees, customers, and partners require fast and reliable access to data contained on corporate servers. Overloading the servers can cause a several second delay in data acquisition. When these several second delays are multiplied by hundreds or thousands of users over the course of hundreds of thousands of data access attempts, there is a potential for a significant loss of productivity because of poor server performance. Introducing remote access connectivity to corporate Web servers via a Web proxy can put extra load on those servers. Users located on the corporate network need to compete with data access attempts of new users located outside the corporate network. The increased number of users accessing the same data on the same servers not only increases the load on the corporate data servers themselves, but also increases the load on the entire corporate networking infrastructure. There are several ways companies can solve these problems. These include: Employing reverse caching to decrease corporate intranet traffic Web proxy devices often have the capability to cache or store information previously requested by other users. If a previous user has already requested information from the corporate Web server, that information can be stored in the cache located on the Web proxy device. When subsequent users request the same information, the Web proxy device can 8

9 return the information from its cache instead of forwarding the request to the corporate Web server. This reduces the traffic load on the intranet and also reduces the burden on the corporate Web server s processor and memory. Configuring a Web proxy to perform SSL offloading Secure Web connections using the SSL encryption method can tax processor resources on corporate Web servers. Remote access connectivity adds to the stress on the corporate Web servers because of the additional secure SSL Web connections introduced by remote users. This problem can be solved by using a method known as SSL offloading. SSL offloading makes it possible for external users to create secure SSL Web connections to the Web proxy and then have the Web proxy forward those connections as unencrypted connections to the corporate Web server. This reduces the burden of SSL encryption processing on the Web server while ensuring a secure SSL Web connection for the connection that travels over the Internet. Deploying a Web farm of servers performing the same roles or containing the same content A Web farm is a collection of Web servers that perform the same roles or contain the same content. Deploying a Web farm allows you to reduce the load on, and increase the performance of, each individual Web server in the Web farm by spreading the traffic across multiple computers (load balancing). A Web farm can also provide for increased reliability because it s possible to have connections automatically moved away from a disabled server to one in the Web farm that is still functional (fault tolerance). ISA Server 2006 Solutions for Performance Issues Due to Distributed Workforce Remote Access Connectivity ISA Server 2006 Web proxy capabilities can solve performance problems using the following technologies: Web proxy caching SSL bridging Web farm load balancing Web Proxy Caching The ISA Server 2006 Web proxy includes a powerful Web caching feature enabling it to store information previously requested by users on the ISA Server 2006 Web proxy device. Web proxy caching can reduce load on the corporate Web servers due to remote access connections. For example, consider a company with a SharePoint Portal Server computer containing a number of static Web pages, files, and graphics that are accessed by remote users. The Web server must respond each time a user located outside the corporate network makes a request for content when a caching Web proxy is not in use. When another user located outside the corporate network makes a request for the same content, the Web server must also respond to that request. If there are hundreds or thousands of users outside the corporate network making requests for the same information on the SharePoint Portal Server computer, the server must respond to each of these requests individually. This creates a duplication of effort. This repeated process can put strain on the SharePoint Portal Server computer, reducing performance for users located both inside and outside the corporate network. The ISA Server 2006 Web proxy caching solution improves performance by caching content already requested by previous users. In the SharePoint Portal Server scenario, a user outside the corporate network requests a file stored on the SharePoint Portal Server computer. A second user makes a connection through the ISA Server 2006 Web proxy and requests the same file. 9

10 The ISA Server 2006 Web proxy has a copy of the file that the first user requested in its Web cache, and it sends this copy to the second user. The SharePoint Portal Server computer need never be contacted for the second request. This prevents redundant requests to the Web server and reduces server load. Companies can benefit from the intelligence built into the ISA Server 2006 Web caching feature. The ISA Server 2006 administrator can customize how the Web proxy caches content so that some content is always cached, some content is never cached, and some content is cached based on settings on the Web server. The ISA Server Web proxy administrator can also control whether content served over a secure SSL Web connection is cached. This is an important security feature that is not available in many other Web proxy solutions. SSL Bridging Using the ISA Server 2006 Web proxy unique SSL bridging feature, you can reduce resource consumption on the corporate Web server by allowing external users to establish a secure SSL connection to the ISA Server 2006 Web proxy and then have the Web proxy forward the connection as an unencrypted HTTP connection. This enables secure connections over the Internet while reducing processing on the corporate Web server (SSL offloading). SSL offloading can be difficult to configure with some Web proxy solutions. Mistakes can lead to failed remote access connections to corporate Web servers and potential security compromises. ISA Server 2006 reduces the danger of deploying SSL offloading. The ISA Server Web publishing wizards make it easy to properly configure and secure connections from remote access users to the corporate Web servers. Web Farm Load Balancing Companies can reduce the load and increase performance on corporate Web servers by creating Web farms. Servers participating in the Web farm act in the same role or contain duplicated content. For example, your firm might want to increase reliability and performance for remote access connections to Exchange Web services by creating a Web farm of front-end Exchange servers. In another example, your company may want to host a Web farm of SharePoint Portal Server computers that are designed to contain duplicated content. Web farms not only increase performance by reducing load on each server in the Web farm, they also increase availability. If one server in the Web farm is disabled (such as being taken offline for maintenance), other servers in the Web farm take over, so remote access users are never aware of the offline server. The challenge to taking full advantage of Web farms is to have a Web proxy that can load balance connections across the multiple servers and provide failover for offline servers. ISA Server 2006 includes a new Web farm publishing feature, which allows companies to take full advantage of their Web farms. ISA Server 2006 can automatically load balance connections to members of a Web farm so that no server in the Web farm receives more connections than any other, effectively randomizing connections among all the servers in the farm. If one server in the Web farm becomes unavailable, the ISA Server 2006 Web proxy can automatically detect the situation and transparently redirect connections to online servers. Users are never affected by the disabled server and connections continue without interruption. ISA Server 2006 Web farm publishing makes it possible. ISA Server 2006 Solutions for Simplifying Deployment of an Application Security and Acceleration Solution Adding a new application protection device to the network can potentially strain networking infrastructure team resources. Unlike adding a new server or workstation, Web application security devices like ISA Server 2006 can potentially impact the workload of the network infrastructure team and increase network complexity. 10

11 The corporate networking team needs solutions compatible with their network infrastructure. The following is a common scenario encountered when introducing new application security devices to a network: The company already has a comprehensive firewall infrastructure in place and does not want or need to replace it. The corporate networking infrastructure team has an established routing and switching infrastructure and does not want to introduce an inline device requiring changes to the corporate IP addressing scheme. Employees responsible for application security are often not part of the network infrastructure team. This can cause delays in Web application security deployment and potential conflict among the teams. ISA Server 2006 solves the Web application security and the network infrastructure team s problems by supporting a Web proxy only setup. Although ISA Server 2006 can be configured to be a powerful inline application inspection firewall, this is not a requirement. With the Web proxy only configuration, the ISA Server 2006 Web proxy can be set up with a single network interface card (NIC) and dropped onto the network like a file server, print server, or server. ISA Server 2006 Solutions for Reducing Cost of Network Operations Caching Web proxy servers can be used to reduce the overall cost of network operations. Unlike many other IT-related capital infrastructure investments, a caching Web proxy server can significantly reduce hard-coded costs related to network bandwidth usage as well as potential costs related to a security breach. ISA Server 2006 can save bandwidth costs when deployed in the following scenarios: When the ISA Server Web proxy provides users on the corporate network forward proxy services When the ISA Server 2006 Web proxy cache stores information from requests made by users connecting to Internet Web sites, it makes that information available to users who subsequently request the same information. Each time the ISA Server 2006 Web proxy cache responds without requiring the connection to be forwarded to the Internet Web server represents Internet bandwidth cost savings. This may be a direct cost savings for companies paying for metered bandwidth, or an indirect savings in terms of increased performance or productivity for companies with unlimited access plans. When the ISA Server Web proxy provides forward proxy services for branch offices ISA Server 2006 Web proxy caching can reduce bandwidth on dedicated WAN links connecting main and branch offices. When a user at the branch office requests content from Web servers located either on the Internet or on the main office network, that content is stored in the branch office Web proxy cache. Subsequent requests for the same information are returned from the Web proxy cache instead of from the Internet or main office server. This can significantly reduce bandwidth costs related to WAN link usage. When the ISA Server Web proxy provides reverse proxy services for branch offices A variation of the previous configuration has the ISA Server 2006 Web proxy located at a branch office performing reverse proxy services. In this scenario, the ISA Server computer caches content from secure SSL Web servers and performs application-layer inspection on the otherwise unreadable SSL encrypted data. Because ISA Server 2006 Web proxy caches the information, repeated requests to the main office Web servers are not required, reducing bandwidth required on the WAN link and reducing costs related to tiered WAN pricing. Proactively cache content on branch office Web proxy servers 11

12 Many organizations have large amounts of content stored on main office Web servers. Users at branch offices need to have continuous access to this content, but access to content is often hampered by slow or unreliable WAN links. ISA Server 2006 can pre-load that content on each branch office server so that connections to main office Web servers are initiated only when content has changed. This increases employee productivity. It can also provide profound bandwidth savings. For a detailed analysis of the cost savings that can be realized by deploying a Web caching ISA Server 2006 proxy on the corporate network, see the Reducing Network Operating Expenses with ISA Server 2004 white paper at the ISA Server 2004 White Papers Web site. 12

13 Meeting the Challenges of Secure Employee Internet Access and Increasing Employee Productivity Companies have typically allowed employees to access Internet sites without restrictions. This is no longer a viable option because employees may inadvertently download viruses, worms, remote access Trojan horses, rootkits, and other forms of malicious software (malware). Employees may deliberately access inappropriate content (pornography, pirated software, or songs) that can make the company civilly liable or even involve it in a criminal investigation. Unlimited access to the Internet creates an unacceptable security risk and significantly increases the likelihood that the company will fall outside of industry compliance guidelines. Employees are under increased pressure to complete work quickly and efficiently. Most companies depend on fast and reliable Internet access to reach this goal. If access to information is impaired, the company can suffer thousands of dollars per hour in lost productivity. Deploying an ISA Server 2006 Web proxy server can help mitigate the security risks of malicious code and inappropriate content, and improve employee productivity. Securing Employee Access to the Internet In a report published in 2004, technology market intelligence service IDC identified the following risks to corporate networks from uncontrolled access to the Internet: Rising number of Web-based viruses and blended threats, such as NIMDA, Code Red, and Blaster. Increasing use of peer-to-peer (P2P) file-sharing applications, which can be used to download copyrighted material, transfer infected files, and share proprietary corporate information to anyone in the world. Increasing prevalence of spyware, which can be used to capture user information such as user names and passwords, and can even include key logging software that records each keystroke made on the infected computer. Growing number of phishing attacks that rely on the naiveté of users to collect private information entered into forms on Web sites, which is subsequently used for identity theft or other fraudulent purposes. Expanding number of employees who download and install software from untrusted sources, which can potentially contain malicious software that can disable the users computers or expose the company to fines due to unlicensed software use. Increasing problem of reduced employee productivity due to the expansion of online gaming, gambling, news, social networking, and other non-business related sites. All of these exploits can be executed over Web connections using the HTTP, HTTPS, or FTP protocols. A Web proxy device can be used to prevent these exploits in the following ways: Control the downloading of Web-based viruses and other exploit code such as Trojan horses and rootkits by setting the Web proxy to disallow access to executable files and prevent connections to Web sites known for posting malicious code. Block access to P2P applications by configuring the Web proxy to block access to key logon sites required for the P2P applications and by inspecting characteristics of the HTTP communications to identify these applications. Stop phishing attacks by denying access to sites that post phishing pages. 13

14 Enhance employee productivity by limiting sites that users are allowed to access and controlling how long they can access those sites. ISA Server 2006 Solutions for Employee Access to the Internet ISA Server 2006 Web proxy can solve Internet access control problems using multiple technologies. These include: HTTP filter Per-site access controls Per-group access controls Time of day access controls Content type access controls Comprehensive logging and reporting HTTP Filter As mentioned earlier in this white paper, the ISA Server 2006 HTTP filter can help prevent malicious users from sending illegal commands to corporate Web servers. When used in a forward proxy environment, the ISA Server 2006 HTTP filter can help block executable files that launch dangerous code such as spyware, worms, and viruses. The HTTP filter can also be configured to block dangerous file types, Web page extensions, and pages containing keywords considered inappropriate in a corporate computing environment. Per-Site Access Controls Blocking all Internet access is not feasible. The ISA Server 2006 Web proxy enables a company to create allow lists of sites approved by corporate security and compliance teams. Employees are able to use the Internet to complete their work but are blocked by the ISA Server 2006 Web proxy from seeing content on unapproved sites. If the company has a less restrictive Internet access philosophy, the ISA Server 2006 Web proxy can be configured to block known dangerous or non-work related sites while enabling access to all other Internet content. Per-Group Access Controls Not all users require the same level of Internet access. Some users require access to a very limited set of Web sites. Other groups of users need access to a much broader range of Web sites, and still other groups may require unrestricted access to Internet content. ISA Server 2006 enables you to configure custom rules so that Internet access can be granted on a per-user or per-group basis, enabling all employees the access they require and nothing more. Time of Day Access Controls Many companies do not allow Internet access except for certain times of day or particular days of the week. Other companies allow access to work-related sites at all times of day and all days of the week, but restrict access to other sites to specific times of day or days of the week. ISA Server 2006 enables you to have fine-tuned control over sites that employees access, and when they can access them. Content Type Access Controls Companies require strong access controls to prevent downloading of high risk or productivity draining content. ISA Server 2006 includes comprehensive controls for restricting content access. ISA Server 2006 enables the administrator to allow or deny access to the following types of content: Applications Application data files Audio files and streaming content 14

15 Documents HTML documents Images Macro documents Text Video Virtual Reality Modeling Language (VRML) ISA Server 2006 enables the company to create Web proxy policies so that content controls can be applied on a per-site, per-user, per-time of day, or day of week basis. Using the ISA Server 2006 Web proxy provides your company robust access control over all information moving over Web connections. Comprehensive Logging and Reporting ISA Server 2006 Web proxy logging and reporting provides comprehensive information about user Internet access. Default log settings enable ISA Server to gather detailed information about user Web access and create illustrative reports using the ISA Server 2006 built-in reporting engine. You can customize reports to provide detailed information about user Web access. Thirdparty reporting applications can be used to provide even more detailed reports about user activity through the ISA Server 2006 Web proxy. For more information about third-party enhancements to ISA Server 2006 reporting, see the Microsoft ISA Server 2006 Partners Web site. Increasing Employee Productivity by Accelerating the Internet Employees require fast and reliable Internet access to complete work quickly and efficiently. Companies can suffer from low employee productivity due to slow or unreliable access to data in a number of situations. Some of these include: Slow or offline Internet Web servers The Internet is not a reliable network. There are many points of passage between corporate Internet users and the Internet Web site. If any critical link between the corporate network and the Web site becomes unavailable, users may not be able to complete vital work-related tasks. Web proxy servers cache content from mission-critical Web sites so that even if the Web sites are slow to respond or offline, that content can still be delivered to the user from the Web proxy cache. Saturated Internet links As Internet use becomes increasingly critical for information access, the demands on the corporate Internet link increase. With increased usage of the existing corporate Internet connection comes the prospect of bandwidth saturation. High speed, reliable Internet connections are expensive. Upgrading Internet connections not only incurs the increased expense inherent in the service, but possibly additional costs related to hardware and software upgrades necessary to support the new connection. Companies can either avoid or reduce the costs of upgraded links by introducing a caching Web proxy. Unavailable Intranet Web servers Users at branch offices often require access to large amounts of information contained on corporate Web servers. Access to this information is critical for almost every employee on the network. If these mission-critical Web servers should become unavailable for any reason, workflow could stop. Branch offices are at risk of being unable to access essential information because they often use relatively unstable dedicated WAN links or site-to-site virtual private 15

16 network (VPN) connections to connect to the main office. Introducing a caching Web proxy server at the branch office enables branch office employees access to copies of the data contained on the main office Web server even when the WAN or Internet links are unavailable. Slow branch office WAN links Branch office employees can still suffer reduced productivity even when the links to the main office are available. Branch office WAN links can become saturated by the increasing burden of application traffic moving over them. The end-user experience becomes frustrating and time consuming due to these slow connections. A caching Web proxy server can help solve this problem by bringing content closer to branch office users and making it available to them at local network speed even when the WAN link is saturated. ISA Server 2006 Solutions for Increasing Employee Productivity ISA Server 2006 Web proxies solve employee productivity problems using the following technologies: High performance in-memory and disk Web cache Cache rules Content download jobs Web proxy chaining rules HTTP compression BITS caching Quality of Service controls for Web connections Integrated Network Load Balancing (NLB) High Performance In-Memory and Disk Web Cache ISA Server 2006 includes a high performance in-memory and disk-based Web caching system. The in-memory cache allows the ISA Server computer to hold the most popular and most recently accessed Web content in ultra-fast RAM memory. Less popular and older Web content is stored in the hard disk-based cache. The combination of in-memory and disk-based caches enables the ISA Server computer to return gigabytes of cached Web content at near wire speed. Cache Rules There is a wide variety of content from Internet and corporate Web servers that can be cached. However, a company may not want to cache all cacheable content. For example, the company may choose to cache only work-related information. The company may want to cache static content but not dynamic content. Another company may want to cache all content, even if the Web server hosting the content does not indicate that the content is cacheable. ISA Server 2006 provides your firm a high level of control over which content is cached, how long content is cached, the maximum size of cached Web objects, the total amount of content that can be cached over a period of time, and much more. Content Download Jobs Critical content should always be available, even if the Internet connection or the Web server hosting the content fails. ISA Server 2006 helps make content available continuously using the ISA Server content download job feature. A content download job can be configured to automatically download into the Web proxy cache information that must always be available. Content download jobs can also be scheduled on a custom basis so that the Web proxy cache is automatically updated with the latest version of required content. 16

17 Web Proxy Chaining Rules Businesses often deploy multiple layers of Web proxy servers. Web proxy servers can be connected to other Web proxies in a communications chain allowing downstream Web proxies to benefit from upstream Web caches. An example of this type of Web proxy communications network is the branch office Web proxy linked to a main office Web proxy. In most cases, the main office Web proxy has a much larger Web cache than that of the branch office. This enables the branch office Web proxy to receive content from the main office Web proxy. The company saves the cost of Internet bandwidth that would otherwise be required to obtain the content from the Internet Web server. ISA Server 2006 allows you to create Web proxy chaining rules to create high performance Web proxy networks. HTTP Compression You can transport less data faster than more data over a network connection. ISA Server 2006 takes advantage of this fact by reducing the size of the information crossing the network over a Web connection. Using industry standard methods of HTTP compression, ISA Server 2006 compresses information it sends and receives over the network. HTTP compression reduces the bandwidth required to communicate over the intranet to the Internet and over branch office WAN links. Because less bandwidth is required, users are able to connect to information resources much more quickly to complete their work. Quality of Service Controls for Web Connections Network routers, firewalls, switches, and other network devices make best effort attempts to deliver data over the network. This means all connections are treated equally. Many companies recognize that data transfers to and from some servers are more important than others. Quality of Service (QoS) controls allow you to prioritize communications to key corporate assets. ISA Server 2006 includes a built-in QoS feature enabling you to give higher priority to connections to key servers. Users connecting to these servers receive information faster than when connected to servers that do not receive preferential treatment. ISA Server 2006 QoS enables you to streamline communications to essential sites while providing best effort connections to other sites. Integrated Network Load Balancing Although ISA Server 2006 technologies discussed in this section help accelerate access to the Internet, NLB makes Internet access highly available. ISA Server 2006 Enterprise Edition can be configured in an NLB array of servers. When a member server in an NLB array goes offline or becomes unavailable due to maintenance, other servers in the array take over that server s duties to ensure that employees can access Internet information. Only when all array members are offline will employees not be able to access business-critical information on the Internet. 17

18 Summary Almost all companies have a connection to the Internet. The Internet connectivity enables employee access to information on Internet Web servers, Web servers located at partner sites, and Web content hosted on the corporate intranet. Although the Internet improves the ability to share and act on information, these connections also carry the risk of spreading dangerous exploits and attacks from hackers and other malicious individuals. Companies need a way to allow secure connections to corporate Web servers from users located outside the corporate network, and mechanisms to prevent users on the corporate network from downloading dangerous or inappropriate information. A popular solution to the problem of secure Web access is a Web proxy. Web proxies help companies to control the flow of information moving over Web channels using the HTTP, HTTPS, and FTP protocols. Web proxies act as intermediaries between client and server, whether that client is on the corporate network and the server is on the Internet, or the client is located on the Internet and the server is on a corporate intranet. By acting as an intermediary, Web proxies can inspect Web communications moving through it, and help prevent suspicious and dangerous communications and code from traversing the Web proxy. Web proxies can speed access to work-related content, provide content availability when content servers are unavailable, and reduce bandwidth costs by employing Web caching technologies. A caching Web proxy can store content closer to the user and return content without requiring the request to be passed to a Web server on an unreliable Internet connection or a bandwidth constrained dedicated WAN link. This white paper discussed how ISA Server 2006 can be used as a Web proxy that helps to solve security and reliability problems encountered by today s businesses. Specific solutions include how to provide more secure remote access to information contained on corporate Web servers, how to better secure and control Internet access for employees located on the corporate network, how to reduce total cost of network operations by deploying the ISA Server 2006 Web proxy server, and how to improve employee productivity by using ISA Server 2006 Web proxy caching. This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Server, Exchange, Internet Security and Acceleration (ISA) Server 2006, Microsoft Operations Manager, Outlook, PowerPoint, SharePoint, Windows Mobile, are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. 18

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

What s New in ISA Server 2004 ISA Server 2004 contains a fullfeatured,

What s New in ISA Server 2004 ISA Server 2004 contains a fullfeatured, Microsoft Internet Security and Acceleration (ISA) Server 2004 is the advanced application-layer inspection firewall, VPN, and Web cache solution that enables enterprise customers to maximize existing

More information

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES Contents Introduction 3 SSL Encryption Basics 3 The Need for SSL Traffic Inspection

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

Application Visibility and Monitoring >

Application Visibility and Monitoring > White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA 98104 www.watchguard.com

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA 98104 www.watchguard.com SMALL BUSINESS NETWORK SECURITY GUIDE WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION AUGUST 2004 SMALL BUSINESS NETWORK SECURITY GUIDE: WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION

More information

Netsweeper Whitepaper

Netsweeper Whitepaper Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826 5222 F: +1 (519) 826 5228 Netsweeper Whitepaper Deploying Netsweeper Internet Content

More information

WHITE PAPER. Understanding How File Size Affects Malware Detection

WHITE PAPER. Understanding How File Size Affects Malware Detection WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through

More information

F5 and Microsoft Exchange Security Solutions

F5 and Microsoft Exchange Security Solutions F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application

More information

Load Balancing for Microsoft Office Communication Server 2007 Release 2

Load Balancing for Microsoft Office Communication Server 2007 Release 2 Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks

More information

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management

More information

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business)

How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business) Hosted Exchange +SharePoint: Communication and Collaboration This is the next generation of affordable, reliable messaging and portal solutions with Microsoft Exchange 2010 and Microsoft SharePoint 2010.

More information

E-Guide. Sponsored By:

E-Guide. Sponsored By: Security and WAN optimization: Getting the best of both worlds E-Guide As the number of people working outside primary office locations increases, the challenges surrounding security and optimization are

More information

Zscaler Internet Security Frequently Asked Questions

Zscaler Internet Security Frequently Asked Questions Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices

More information

The Next Generation Network:

The Next Generation Network: JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite

More information

Getting a Secure Intranet

Getting a Secure Intranet 61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

The Application Delivery Controller Understanding Next-Generation Load Balancing Appliances

The Application Delivery Controller Understanding Next-Generation Load Balancing Appliances White Paper Overview To accelerate response times for end users and provide a high performance, highly secure and scalable foundation for Web applications and rich internet content, application networking

More information

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: victorkleo@live.com ABSTRACT Internet security

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Reverse Proxy for Trusted Web Environments > White Paper

Reverse Proxy for Trusted Web Environments > White Paper > White Paper ProxySG for Reverse Proxy Web-based solutions are being implemented for nearly every aspect of business operations, and increasingly for trusted environments with mission-critical business

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

Cisco SR 520-T1 Secure Router

Cisco SR 520-T1 Secure Router Secure, High-Bandwidth Connectivity for Your Small Business Part of the Cisco Small Business Pro Series Connections -- between employees, customers, partners, and suppliers -- are essential to the success

More information

WebMarshal User Guide

WebMarshal User Guide WebMarshal User Guide Legal Notice Copyright 2014 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000 Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for

More information

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link) NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering

More information

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic 1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

The Application Front End Understanding Next-Generation Load Balancing Appliances

The Application Front End Understanding Next-Generation Load Balancing Appliances White Paper Overview To accelerate download times for end users and provide a high performance, highly secure foundation for Web-enabled content and applications, networking functions need to be streamlined.

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Protecting Your Network Against Risky SSL Traffic ABSTRACT Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure

More information

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 11 THINGS YOUR FIREWALL SHOULD DO a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 2 THE GUIDE OF BY DALE SHULMISTRA Dale Shulmistra is a Technology Strategist at Invenio IT, responsible for

More information

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail How Fail Today s Networks And Why Will Prevail Why your current firewall may be jeopardizing your security, and how you can counter today s threats, manage web 2.0 apps and enforce acceptable-use policies.

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall

More information

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Cyan Networks Secure Web vs. Websense Security Gateway Battle card URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database

More information

Security. TestOut Modules 12.6 12.10

Security. TestOut Modules 12.6 12.10 Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card

More information

Top five strategies for combating modern threats Is anti-virus dead?

Top five strategies for combating modern threats Is anti-virus dead? Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.

More information

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway TESTING & INTEGRATION GROUP SOLUTION GUIDE Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway INTRODUCTION...2 RADWARE SECUREFLOW... 3

More information

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3 WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113

More information

White Paper Secure Reverse Proxy Server and Web Application Firewall

White Paper Secure Reverse Proxy Server and Web Application Firewall White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security

More information

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3

More information

Get Control of Your Data Center. Application Delivery Controllers

Get Control of Your Data Center. Application Delivery Controllers White Paper Get Control of Your Data Center Application Delivery Controllers May 2011 Get Control of Your Data Center Access. Security. Delivery. Introduction Data center and networking technologies have

More information

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser) 1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses White Paper How to Effectively Provide Safe and Productive Web Environment for Today's Businesses Table of Content The Importance of Safe and Productive Web Environment... 1 The dangers of unrestricted

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

Assuring Your Business Continuity

Assuring Your Business Continuity Assuring Your Business Continuity Q-Balancer Range Offering Business Continuity, Productivity, and Security Q-Balancer is designed to offer assured network connectivity to small and medium business (SME)

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

WAN Optimization for Microsoft SharePoint BPOS >

WAN Optimization for Microsoft SharePoint BPOS > White Paper WAN Optimization for Microsoft SharePoint BPOS > Best Practices Table of Contents Executive Summary 2 Introduction 3 SharePoint BPOS performance: Managing challenges 4 SharePoint 2007: Internal

More information

Securing Endpoints without a Security Expert

Securing Endpoints without a Security Expert How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series

More information

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...

More information

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ

More information

Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices. White Paper Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

More information

PEER-TO-PEER NETWORK

PEER-TO-PEER NETWORK PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

White paper. Keys to SAP application acceleration: advances in delivery systems.

White paper. Keys to SAP application acceleration: advances in delivery systems. White paper Keys to SAP application acceleration: advances in delivery systems. Table of contents The challenges of fast SAP application delivery...3 Solving the acceleration challenge: why traditional

More information

GiftWrap 4.0 Security FAQ

GiftWrap 4.0 Security FAQ GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels

More information

Astaro Gateway Software Applications

Astaro Gateway Software Applications Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security

More information

Enterprise K12 Network Security Policy

Enterprise K12 Network Security Policy Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,

More information

Superior protection from Internet threats and control over unsafe web usage

Superior protection from Internet threats and control over unsafe web usage datasheet Trend Micro interscan web security Superior protection from Internet threats and control over unsafe web usage Traditional secure web gateway solutions that rely on periodic updates to cyber

More information

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an

More information

The Evolving Threat Landscape and New Best Practices for SSL

The Evolving Threat Landscape and New Best Practices for SSL The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...

More information

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Stopping secure Web traffic from bypassing your content filter. BLACK BOX Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

The Evolution of Application Acceleration:

The Evolution of Application Acceleration: WHITE PAPER The Evolution of Application Acceleration: From Server Load Balancers to Application Delivery Controllers www.crescendonetworks.com Corporate Headquarters 6 Yoni Netanyahu Street Or-Yehuda

More information

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper

HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper Doc. code HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper Issue 1.0 Date 2014-08-21 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2012. All rights

More information

FAQs for Oracle iplanet Proxy Server 4.0

FAQs for Oracle iplanet Proxy Server 4.0 FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

AppDirector Load balancing IBM Websphere and AppXcel

AppDirector Load balancing IBM Websphere and AppXcel TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT

More information

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,

More information

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com Wireless Services The Top Questions to Help You Choose the Right Wireless Solution for Your Business Get Started Now: 877.611.6342 to learn more. www.megapath.com Why Go Wireless? Today, it seems that

More information

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

White Paper A10 Thunder and AX Series Load Balancing Security Gateways White Paper A10 Thunder and AX Series Load Balancing Security Gateways June 2013 WP_LB FW 062013 Disclaimer This document does not create any express or implied warranty about A10 Networks or about its

More information

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical

More information

Load Balancing Security Gateways WHITE PAPER

Load Balancing Security Gateways WHITE PAPER Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Simple security is better security Or: How complexity became the biggest security threat

Simple security is better security Or: How complexity became the biggest security threat Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components

More information

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

Module 12: Microsoft Windows 2000 Clustering. Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8

Module 12: Microsoft Windows 2000 Clustering. Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8 Module 12: Microsoft Windows 2000 Clustering Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8 Information in this document is subject to change without notice.

More information

F5 provides a secure, agile, and optimized platform for Microsoft Exchange Server 2007 deployments

F5 provides a secure, agile, and optimized platform for Microsoft Exchange Server 2007 deployments APPLICATION READY SOLUTION GUIDE Key Benefits Eliminate 70% of unwanted email, before it reaches your Exchange Servers Gain more than 25% server capacity with SSL and Compression offload Experience up

More information