The following topics describe how to protect your organization from attacks that exploit known vulnerabilities in Microsoft operating systems and applications:
- Enabling and configuring
the Network Inspection System—Describes how to enable and
configure the Network Inspection System (NIS), which is the
signature-based part of the Forefront TMG Intrusion Prevention
- Managing NIS signature
downloads—Describes how to configure automatic signature
updates for the Network Inspection System.
- Activating a different
signature set—Describes how to change the active signature set
version, which is useful for troubleshooting purposes.
- Defining NIS
exceptions—Describes how to exclude network entities from
Network Inspection System scans.
- Managing individual NIS
signatures—Describes how to modify the NIS response policy for
an individual signature.
- Testing NIS
functionality—Describes how to verify that the NIS is