Book Image

Mastering Microsoft Forefront UAG 2010 Customization

Book Image

Mastering Microsoft Forefront UAG 2010 Customization

Overview of this book

While UAG is built to integrate with many environments and publish dozens of application types, many organizations require a certain level of customization to meet their needs. With this book in hand, you will be equipped to deal with these types of customization scenarios, and you will be confident in using such workarounds without hassle and trial and error. Written by some of the leading experts on UAG, "Mastering Microsoft Forefront UAG 2010 Customization" covers the most complex and challenging options for customizing UAG in a way that is friendly and easy to follow. It walks you through various customization tasks, including explanations and code samples, as well as creative ideas for troubleshooting your work. Until now, only a few of the extensions to UAG's services have been publicly available, and most were only known to a select few. Now, this can include you! Throughout this book, you will tackle how to change the system's look-and-feel, deal with advanced authentication schemes and write special functions that need to be executed as part of the client interaction. With "Mastering Microsoft Forefront UAG 2010 Customization", you too can learn how to customize various aspects of UAG's functionality to enhance your organization or customers' experience.
Table of Contents (16 chapters)
Mastering Microsoft Forefront UAG 2010 Customization
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface

Endpoint detection in the real world


The purpose of endpoint detection is to allow us to control access, and ultimately deny computers that don't meet our security policy criteria. If the requirements are simply to check for the existence of antivirus software, or a specific version of Windows, then there's really no need for customization. A custom detection script comes in handy when we want to validate something beyond that. The requirement that comes up most often is the need to verify that the computer is a corporate asset, as opposed to some random computer the user happens to be using.

The default endpoint detection allows us to check the computer's domain, and match it against the one we specify. However, this is clearly not very secure, as the comparison is textual and anyone can spoof this rather easily.

With a custom detection, you could implement other ways. For example, you could plant a specific file somewhere on the hard drive of every corporate computer, and then use the custom...