Forefront TMG has a number of protection technologies that allow you to protect the computers and servers in your extended network. The following topics describe how to enable, configure, and keep up-to-date these protections:
Note: |
---|
For more information about these protections, see Protection design guide for Forefront TMG. |
- Configuring protection
from known vulnerabilities—Describes how to protect your
networks from attempts to exploit known vulnerabilities in
operating systems and applications.
- Configuring protection
from network attacks—Describes how to protect your networks
from flood, DNS, and other kinds of attacks.
- Configuring protection
from Web-based threats—Describes how to protect your
organization from malware and other Web-based threats:
- Configuring protection
from e-mail-based threats—Describes how to protect your SMTP
mail servers (and consequently e-mail recipients) from spam,
viruses and other malware.
- Managing definition
updates for Forefront TMG—Describes how to configure the update
mechanisms for these protections.