Configuring protection from known vulnerabilities
Updated: February 1, 2011
Applies To: Forefront Threat Management Gateway (TMG)
The following topics describe how to protect your organization from attacks that exploit known vulnerabilities in Microsoft operating systems and applications:
Enabling and configuring the Network Inspection System—Describes how to enable and configure the Network Inspection System (NIS), which is the signature-based part of the Forefront TMG Intrusion Prevention System.
Managing NIS signature downloads—Describes how to configure automatic signature updates for the Network Inspection System.
Activating a different signature set—Describes how to change the active signature set version, which is useful for troubleshooting purposes.
Defining NIS exceptions—Describes how to exclude network entities from Network Inspection System scans.
Managing individual NIS signatures—Describes how to modify the NIS response policy for an individual signature.
Testing NIS functionality—Describes how to verify that the NIS is functioning properly.
Related Topics
Concepts
Protecting your networks
Planning to protect against known vulnerabilities