Understanding IAG 2007

There are many people that still having doubts about IAG and why IAG 2007 has the ISA Server 2006 on the same box. To understand that let’s see the diagram below:   Figure 1 – Software layer that involved on the way that IAG 2007 Server handles the traffic.   This figure shows the main…


Routing issues accessing internal resources through VPN

1. Introduction   More and more the companies are allowing the employees to access the internal resources remotely.  The good thing is that they are also concern about security.  For remote access, the VPN still one of the most used solutions for small, medium and large companies.  This scenario was based on a case that…


Publishing Terminal Server through IAG 2007 – Part 3 of 3

1. Understanding the Traffic   One of the main things that you need to be aware prior to start monitoring your session is how the traffic works. On the part 1 of this walk through I showed you (on figure 1) a brief explanation of the traffic.  The following netmon traffic was taken from the…


Publishing Terminal Server through IAG 2007 – Part 2 of 3

1. Endpoint Policy   The Endpoint Policy concept is pretty straight forward: are you compliant with company’s security policy or not? If yes, then access the resource, if not then your access will be denied. There is no “maybe I’m compliant”, the endpoint policy is a mechanism that will assure that regardless of where you…


Publishing Terminal Server through IAG 2007 – Part 1 of 3

1. Growing the Application Portal   The Application Portal that we configured on the last three sessions will grow now. This fictitious company wants to publish their Terminal Server to the authorized users be able to access from anywhere.   This article will be split in two parts, where each part will cover the following…


When Security in Mind doesn’t match with the Application’s Security

1. Introduction   This case was originally written in Portuguese back in September 2006, it is about a case where customer was really concern about security. However his application was not that concern about this subject.  Here is the scenario: ·         Customer has an application that uses LDAP to send query to Active Directory; ·        …


Auditing a DNS Zone

1. Introduction   One of the main aspects of security is the maintenance and to do that correctly the administrator needs to be able to track changes that are done in the environment. There are a lot of challenges on this area and one of the biggest challenge is to log what needs to be…


Publishing OWA 2007 through IAG 2007 – Part 3 of 3

1. Reviewing the Configuration   Last session was finished showing that the default policy blocks upload for computers that are not compliant with guidelines that were defined in the policy. You might be wondering how to see this policy and how to change it, so let’s access this option. Follow the numbers on the screen…