Configuring protection from web-based threats
Updated: February 1, 2011
Applies To: Forefront Threat Management Gateway (TMG)
The following topics describe how to protect your organization from malware and other Web-based threats:
Configuring malware inspection—Describes how to enable and configure the inspection of user-requested Web pages and files for harmful content.
Configuring HTTPS inspection—Describes how to enable inspection of outbound HTTPS traffic, in order to protect your organization from security risks inherent to Secure Sockets Layer (SSL) tunnels.
Configuring HTTP filtering—Describes how to configure the application-layer HTTP filter to allow only HTTP traffic that complies with your corporate policy and security needs.