Security best practices for enterprise management

Microsoft Internet Security and Acceleration (ISA) Server 2006 introduces a multi-tiered architecture, in which configuration information is stored on the Configuration Storage server. Array members communicate with the Configuration Storage server to get up-to-date configuration information. In addition, array members communicate with each other. To help secure this deployment model, follow the security best practices listed in this topic. In addition, to help secure computers running ISA Server services, follow the guidelines listed in Security best practices. You should also review the ISA Server Security Hardening Guide document available at the Microsoft TechNet Web site (http://www.microsoft.com/), because it is updated periodically with new information.

Securing the Configuration Storage server

To secure the Configuration Storage server, follow these guidelines:

Securing intra-array communication

To secure intra-array communication, follow these guidelines:

Network Load Balancing

For Network Load Balancing (NLB), follow these guidelines:

Cache Array Routing Protocol

When you enable Cache Array Routing Protocol (CARP), follow these guidelines:




web link Get latest ISA Server content at ISA Server Guidance(http://www.microsoft.com/).
Send feedback about this page Send feedback about this page.