Key ISA 2000 Knowledge Base Articles
Check out this list of key KB articles compiled by top-notch PSS escalation engineer Scott Jiles. One of them might just solve a tough ISA Server 2000 problem you're having today!
Check out this list of key KB articles compiled by top-notch PSS escalation engineer Scott Jiles. One of them might just solve a tough ISA Server 2000 problem you're having today!
We have all heard alot about trojan horse programs and the threat that they pose to your network's security. This Trojan FAQ sheds some light on what these programs are, what they do, how they can infect your network and suggests measures that could be taken to prevent such infections. You can make sure that you have a good grasp on these malicious programs by browsing through this regularly updated Trojan FAQ which provides the answers to these questions and many others. With thanks to Dancho Danchev for his contributions to this FAQ.
In general, attacks on wireless networks fall into four basic categories: passive attacks, active attacks, man-in-the middle attacks, and jamming attacks. Let's review what these attacks mean on a wireless network.
Not every case of a successful intrusion is “crowned” with a replaced Web site on the server, data theft or damage. Often electronic intruders do not wish to create a spectacle but prefer to avoid fame by hiding their presence on compromised systems, sometimes leaving certain unexpected things. They use sophisticated techniques to install specific “malware” (backdoors) to let them in again later with full control and in secret.
Are you tired of users downloading viruses, worms, trojans and scumware onto your network? Are you tired of conducting software audits on your workstations only to find a week later that same crud on your users desktops? If so, then you need to check out DownloadSecurity and see how it blocks users from downloading malware and viruses and puts you back in control
Firewalls and other simple boundary devices lack some degree of intelligence when it comes to observing, recognizing, and identifying attack signatures that may be present in the traffic they monitor and the log files they collect. Without sounding critical of such other systems’ capabilities, this deficiency explains why intrusion detection systems are becoming increasingly important in helping to maintain proper network security.
I get a lot of questions about how can ISA Server be used to block dangerous applications. What is a dangerous application?
I get a lot of questions about how can ISA Server be used to block dangerous applications. What is a dangerous application?