Download presentation
Presentation is loading. Please wait.
1
Kako povečati varnost omrežja s Forefront TMG Jože Markič, Kompas Xnet d.o.o. joze.markic@kompas-xnet.si
2
Agenda Kaj je TMG? TMG postavitve Primerjava z ISA Subscriptions Secure Web Gateway o HTTPS inspection o URL filtering o Malware protection o Intrusion prevention 2
3
Forefront Edge Security and Access Products BeforeNow Network Protection Network Access The Forefront Edge Security and Access products provide enhanced network edge protection and application-centric, policy-based access to corporate IT infrastructures Integrated and comprehensive protection from Internet-based threats Unified platform for all enterprise remote access needs
4
Forefront TMG Value Proposition Firewall – Control network policy access at the edge Secure Web Gateway – Protect users from Web browsing threats Secure E-mail Relay – Protect users from e-mail threats Remote Access Gateway – Enable users to remotely access corporate resources Intrusion Prevention – Protect desktops and servers from intrusion attempts ComprehensiveIntegrated Simplified
5
Forefront TMG Deployment Scenarios All-in-one solution for medium businesses Firewall, VPN, Web security, IPS, e-mail relay in a single box Unified Threat Management (UTM) Authenticating proxy with security Web antivirus and URL filtering Inspection of HTTP and HTTPS traffic Secure Web Gateway Secure Web publishing Dial-in VPN Site to site VPN Remote Access Gateway Antispam Antivirus E-mail filtering Secure E-mail Relay
6
Features Summary VoIP traversal Enhanced NAT ISP link redundancy Firewall HTTP antivirus/ antispyware URL filtering HTTPS forward inspection Secure Web Access Exchange Edge integration Antivirus Antispam E-mail Protection Network inspection system Intrusion Prevention NAP integration with client VPN SSTP integration Remote Access Array management Change tracking Enhanced reporting W2K8, native 64-bit Deployment and Management Malware protection URL filtering Intrusion prevention Subscription Services
7
Network layer firewall Application layer firewall Internet access protection (proxy) Basic OWA and SharePoint publishing IPSec VPN (remote and site-to-site) Web caching, HTTP compression Web antivirus, antimalware URL filtering E-mail antimalware, antispam Network intrusion prevention Features Summary Comparing with ISA Server 2006 ISA Server 2006 Forefront TMG New Enhanced UI, management, reporting New Exchange publishing (RPC over HTTP) Windows Server® 2008 R2, 64-bit (only) New
8
E E Forefront TMG Licensing Two editions and Two Client Access Licenses (CALs) Standard Edition Full UTM Enterprise Edition Scalability and management Web protection Web protection E-mail protection E-mail protection Subscriptions
9
Comparing Forefront TMG Editions
10
Subscriptions Subscription-based licenses o Sold as Client Access Licenses (CALs) o Charged per user/per year Protection Components o E-mail protection Antispam Antivirus o HTTP protection Antimalware URL filtering o Network Inspection System is free!
11
Single Adapter Scenario Forefront TMG supports using a single network adapter Supported scenarios o Secure Web Gateway (forward Web proxy and cache) o Web Publishing (reverse Web proxy and cache) o Remote client VPN access Unsupported scenarios o Application layer inspection (except for Web proxy) o Server publishing o Non-Web clients Firewall client Secure NAT o Site-to-site VPNs 11
12
Secure Web Gateway 12
13
Threats and Controls Threats Application Layer Firewall HTTPS Inspection Anti- malware URL Filtering NIS Malware Phishing Liability Data Leakage Lost Productivity Loss of Control FullPartialEnabler
14
Forefront TMG HTTPS Traffic Inspection HTTPS Inspection terminates the SSL traffic at the proxy for both ends, and inspects the traffic against different threats o Trusted certificate generated by proxy matching the URL expected by the client 14 URL Filtering Malware Inspection Network Inspection System
15
Enabling HTTPS Traffic Inspection 15 Certificate deployment (via Active Directory® or Import/Export) Configure HTTPS Inspection: Proxy certificate generation/import and customization. Source and destination exclusions Validate only option Notification Configure HTTPS Inspection: Proxy certificate generation/import and customization. Source and destination exclusions Validate only option Notification Client notifications about HTTPS inspection (via Firewall client) Certificate validation (revocation, trusted, expiration validation, etc.)
16
Configuring HTTPS Inspection 16
17
Configuring HTTPS Inspection 17
18
Configuring HTTPS Inspection 18
19
HTTPS Inspection Notifications Notification provided by Forefront TMG client o Notify user of inspection o History of recent notifications o Management of Notification Exception List May be a legal requirement in some geographies 19
20
HTTPS Inspection Notification 20 User Experience
21
Forefront TMG URL Filtering 91 built-in categories Predefined and administrator defined category sets 91 built-in categories Predefined and administrator defined category sets Integrates leading URL database providers Subscription-based Integrates leading URL database providers Subscription-based URL category override URL category query Logging and reporting support Web Access Wizard integration URL category override URL category query Logging and reporting support Web Access Wizard integration Customizable, per-rule, deny messages TMG
22
URL Filtering Benefits Control user web access based on URL categories Protect users from known malicious sites Reduce liability risks Increase productivity Reduce bandwidth and Forefront TMG resource consumption Analyze Web usage
23
What Makes MRS Compelling? Existing URL filtering solutions o Single vendor cant be expert in all categories o Categorization response time MRS unique architecture o MRS merges URL databases from multiple sources/vendors Multi-vendor AV analogy o Based on Microsoft internal sources as well as collaboration with third party partners o Scalable Ongoing collaborative effort o Recently announced an agreement with Marshal8e6 o More announcements to follow
24
Feedback mechanism on Category overrides Fetch on cache miss SSL for auth & privacy No PII How Forefront TMG Leverages MRS Multiple Vendors MRS Query (URL) CategorizerCategorizer Fetch URL PolicyPolicy Cache SSL Telemetry Path (also SSL) Federated Query Cache: Persistent In-memory Weighted TTL Combines with Telemetry Data
25
URL Filtering Categories Liability Security Productivity
26
URL Filtering category precedence No.Category 1"Malicious" 2"Pornography" 3"Botnet" 4"Phishing" 5"Criminal Activities" 6"Hate/Discrimination„ … 75"Unknown" http://www.microsoft.com/security/portal/mrs/ 26
27
Categories and Inheritance
28
URL Filtering Policy URL categories are standard network objects Administrator can create custom URL category sets
29
URL Filtering Policy 29
30
Contoso’s Web Access Policy Access rule allowing users in the Research group to access gambling and gambling-related sites 30 Access rule denying everyone access to Liability and Security sites
31
Per-rule Customization TMG administrator can customize denial message displayed to the user on a per- rule basis o Add custom text or HTML o Redirect the user to a specific URL
32
URL Filtering Configuration 32
33
Category Query Administrator can use the URL Filtering Settings dialog box to query the URL filtering database o Enter the URL or IP address as input o The result and its source are displayed on the tab
34
URL Category Override Administrator can override the categorization of a URL o Feedback to MRS via Telemetry 34
35
User Experience
36
36 HTML tags
37
Novost v SP1 37
38
38
39
HTTP Malware Inspection Third party plug-ins can be used (native Malware inspection must be disabled) Integrates Microsoft Antivirus engine Signature and engine updates Subscription-based Integrates Microsoft Antivirus engine Signature and engine updates Subscription-based Source and destination exceptions Global and per-rule inspection options (encrypted files, nested archives, large files…) Logging and reporting support Web Access Wizard integration Source and destination exceptions Global and per-rule inspection options (encrypted files, nested archives, large files…) Logging and reporting support Web Access Wizard integration Content delivery methods by content type TMG
40
Content Trickling 40 Firewall Service Web Proxy Malware Inspection Filter Request Context Scanner GET msrdp.cab 200 OK Accumulated Content 200 OK
41
Progress Notification 41 Firewall Service Web Proxy Malware Inspection Filter Primary Request Context Secondary Request Context Downloads Map Scanner GET setup.exe 200 OK (setup.exe) Accumulated Content 200 OK (HTML) GET GetDownloadStatus 200 OK (Retrieving) GET GetDownloadStatus 200 OK (Scanning) GET GetDownloadStatus 200 OK (Ready) GET FinalDownload 200 OK (setup.exe)
42
Enabling Malware Inspection Activate the Web Protection license Enable malware inspection on Web access rules o Web Access Policy Wizard or New Access Rule Wizard for new rules o Rule properties for existing rules 42
43
Malware Inspection Global Settings Administrator can configure malware blocking behavior: o Low, medium and high severity threats o Suspicious files o Corrupted files o Encrypted files o Archive bombs Too many depth levels or unpacked content too large o File size too large 43
44
Malware Inspection Per-rule Overrides 44
45
User Experience Content Blocked
46
User Experience Progress Notification 46
47
Network Inspection System (NIS) Protocol decode-based traffic inspection system that uses signatures of known vulnerabilities o Vulnerability-based signatures (vs. exploit-based signatures used by competing solutions) o Detects and potentially block attacks on network resources NIS helps organizations reduce the vulnerability window o Protect machines against known vulnerabilities until patch can be deployed o Signatures can be released and deployed much faster than patches, concurrently with patch release, closing the vulnerability window Integrated into Forefront TMG o Synergy with HTTPS Inspection 47
48
Vulnerability is discovered Response team prepares and tests the vulnerability signature Signature released by Microsoft and deployed through distribution service, on security patch release All un-patched hosts behind Forefront TMG are protected Corporate Network New Vulnerability Use Case 48 Signature Authoring Testing TMG Signature Distribution Service Vulnerability Discovered Signature Authoring Team
49
NIS Response Process Threat Identification Threat Research Signature Development Signature Testing Encyclopedia Write-up Signature Release Targeting 4 hours
50
Enabling and Configuring NIS
51
Client Types Web proxy client o CERN-compatible browsers/applications SecureNAT client o Any host supporting IP Forefront TMG client o Formerly ISA firewall client o Windows computers 51
52
Client Comparison
53
Web Proxy Client Configuration Generate configuration Discover configuration o Automatic configuration script o Web Proxy Auto Discovery (WPAD) o Static proxy configuration Enforce configuration o Manual o Group policy o Forefront TMG client 53
54
SecureNAT clients Only requires proper routing Clients perform DNS resolution Limitations: o No user information passed o No support for secondary connections (without application filter) Use for: o Non-Web protocols o Simple, unauthenticated protocols o Non-Windows systems
55
Forefront TMG Client Formerly known as ISA Firewall client Supports all WinSock-based applications o FwcWsp.dll registered with WinSock protocol stack o FwcWsp tracks all WinSock calls o All remote TCP calls sent to FWC listener (TCP 1745) o User information passed on all requests Use for: o User-based access authentication to non-Web protocols o Complex protocols with secondary connections 55
56
Forefront TMG Client Discovery Secure discovery using Active Directory, with fallback to DHCP and DNS o Secure discovery uses AD to store discovery information for domain members o Forefront TMG client and Web proxy discovery o Allows global and site-specific markers o Configured using TmgAdConfig.exe 56 TmgAdConfig add –site -type -url
57
Server-side Configuration Domains and Addresses tabs determine routing 57
58
? 58
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.