Ben Ari's UAG and IAG Blog

Plenty of useful and fun info on UAG, Microsoft's remote access and reverse-proxy product.

March, 2011

  • UAG and UDID based endpoint detection

    One of the most important features of UAG is its ability to perform endpoint detection, which allows the organizations to control which clients computers and devices can and cannot access the UAG portal and the applications. For example, your organizations...
  • Auto-Parsing UAG traces

    Going through UAG traces can be a tedious task, especially when the server is busy (which could generate over 10,000 lines of trace in a single second). If you have a failed request that you need to trace, the log could be overwhelming, even if the server...
  • No place like HOD

    IBM’s Host On Demand (HOD) application is a fantastic solution, providing access to IBM mainframe servers through a browser. It’s basically a Terminal emulation client written in java, allowing it to be embedded into the browser, and allowing it to be...
  • Applying Network Access Protection configuration failed

    When trying to activate the configuration on a UAG server, you might find that the activation fails, and you are getting the following message in the status window: Error: Applying Network Access Protection configuration failed. Error: The UAG DirectAccess...
  • Outlook any where is it?

    The UAG’s Web Monitor is a fantastic tool for monitoring user activity, but if you are using UAG for publishing outlook anywhere, you may have noticed that the monitor does not show the sessions coming from these users. This is not a mistake or an error...