Protecting your networks
Updated: February 1, 2011
Applies To: Forefront Threat Management Gateway (TMG)
Forefront TMG has a number of protection technologies that allow you to protect the computers and servers in your extended network. The following topics describe how to enable, configure, and keep up-to-date these protections:
Note
For more information about these protections, see Protection design guide for Forefront TMG.
Configuring protection from known vulnerabilities—Describes how to protect your networks from attempts to exploit known vulnerabilities in operating systems and applications.
Configuring protection from network attacks—Describes how to protect your networks from flood, DNS, and other kinds of attacks.
Configuring protection from web-based threats—Describes how to protect your organization from malware and other Web-based threats:
Configuring protection from e-mail-based threats—Describes how to protect your SMTP mail servers (and consequently e-mail recipients) from spam, viruses and other malware.
Managing definition updates for Forefront TMG—Describes how to configure the update mechanisms for these protections.
Related Topics
Concepts
Forefront TMG Operations
Protection design guide for Forefront TMG