Security best practices

Because the computer on which Microsoft Internet Security and Acceleration (ISA) Server 2006 is running is often the primary interface to the External network, we recommend that you secure the computer. In addition to the information in this Help file, you should periodically review the ISA Server Security Hardening Guide document available at the Microsoft TechNet Web site (http://www.microsoft.com/), because it is updated periodically with new information.

Securing the computer

To secure the ISA Server computer, perform the following:

Securing the network environment

To secure the network environment, perform the following:

Securing the configuration

To secure the configuration, perform the following:

RADIUS server configuration recommendations

We recommend that you configure the Remote Authentication Dial-In User Service (RADIUS) server as follows:

Logging and alerting recommendations

Follow the recommendations in this section when configuring logging and alerts. We recommend that you configure logging and alerts as follows:

Additional recommendations

Follow the security recommendations for the operating system running on the ISA Server computer. Study and apply the security practices described in the following documentation:

Note




web link Get latest ISA Server content at ISA Server Guidance(http://www.microsoft.com/).
Send feedback about this page Send feedback about this page.