Book Image

Microsoft Forefront UAG 2010 Administrator's Handbook

By : Erez Ben-Ari, Ran Dolev, Erez Y Ben
Book Image

Microsoft Forefront UAG 2010 Administrator's Handbook

By: Erez Ben-Ari, Ran Dolev, Erez Y Ben

Overview of this book

Microsoft Forefront Unified Access Gateway (UAG) is the latest in a line of Application Publishing (Reverse Proxy) and Remote Access (VPN) Server products. The broad set of features and technologies integrated into UAG makes for a steep learning curve. Understanding all the features and abilities of UAG is a complex task that can be daunting even to experienced networking and security engineers. This book is the first to be dedicated solely to Microsoft Forefront UAG. It guides you step-by-step throughout all the stages of deployment, from design to troubleshooting. Written by the absolute experts who have taken part of the product’s development, official training and support, this book covers all the primary features of UAG in a friendly style and a manner that is easy to follow. It takes you from the initial planning and design stage, through deployment and configuration, up to maintenance and troubleshooting. The book starts by introducing UAG's features and and abilities, and how your organization can benefit from them. It then goes on to guide you through planning and designing the integration of the product into your own unique environment. Further, the book guides you through the process of publishing the various applications, servers and resources - from simple web applications to complex client/server based applications. It also details the various VPN technologies that UAG provides and how to take full advantage of them. The later chapters of the book educate you with common routine “upkeep” tasks like monitoring, backup and troubleshooting of common issues. Finally, the book includes an introduction to ASP, which some of the product's features are based on, and can help the advanced administrator with enhancing and customizing the product.
Table of Contents (21 chapters)
Microsoft Forefront UAG 2010 Administrator's Handbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Configuring restricted zone settings


As we said earlier, the Restricted-Zone policy allows you to have a tighter security for certain parts of an application. In the next chapter, we will discuss the access rules that you can configure on the advanced trunk configuration, which allow you to completely block access to certain URLs with a high level of granularity, but using the restricted-zone feature can be more useful for situations where an application has certain areas that perform actions that may be considered to be more invasive or dangerous.

For example, when using Outlook Web Access, users may use the Options button to configure things like an out-of-office message, create rules, and change their password. Clicking this button in OWA 2010 requests the following URL, which shows the options pop-up: https://mail.createhive.com/owa/ev.owa?oeh=1&ns=Options&ev=GetOptsMnu&canary=10a8f50e34f8492487b8e7dbc74cef90.

An administrator might feel that configuring these options should...