Ескерім
Бұл бетке кіру үшін қатынас шегін айқындау қажет. Жүйеге кіруді немесе каталогтарды өзгертуді байқап көруге болады.
Бұл бетке кіру үшін қатынас шегін айқындау қажет. Каталогтарды өзгертуді байқап көруге болады.
This section provides the steps and results of a threat model analysis (TMA) for each usage scenario for the sample architecture identified in Sample Architectures for Small & Medium-Sized Companies. The purpose of this section is to show you the steps of a TMA. This helps you understand how a TMA works, and describes for you the potential threats we identified for the sample architecture and how we recommend that you reduce their effect.
We categorize the usage scenarios based on the different adapters you can use with Microsoft BizTalk Server, and the use of Enterprise Single-Sign On.
For each scenario, we followed these steps to complete the Threat Model Analysis:
Collect background information
Create and analyze the threat model
Review threats
Identify mitigation techniques and technologies
For more information Threat Model Analysis, see Threat Model Analysis.