My Research Notes and other usefull documentation

Troubleshooting HTTP Filtering in ISA Server

Most of the time you create a HTTP Filter in ISA but sometimes it does not work the way you would...

Author: TechNet Archive Date: 04/30/2009

Error: "Authentication over SSL encrypted channel with the Configuration Storage Server could not be verified"

ISSUE: When installing the ISA Server in workgroup with CSS you may encounter the above mentioned...

Author: TechNet Archive Date: 10/08/2008

Installing the FCS Server in Single Server Architecture

FCS with Single Server Architecture System Requirements for FCS as mentioned in...

Author: TechNet Archive Date: 10/02/2008

Publishing Internal Servers for Telnet in Back to Back ISA Firewall

Diagram Internal Server ===> Back End Firewall <=========> Front End Firewall ========>...

Author: TechNet Archive Date: 12/21/2007

Forefront for Exchange 2007

Forefront for Exchange 2007 is an Anti-virus and content filtering solution. It works only with...

Author: TechNet Archive Date: 12/18/2007

Some Security Tips - Will help Secure you workstation

hey everyone....thanks for reading my blogs. My key focus is security so i mostly bolg on security....

Author: TechNet Archive Date: 12/18/2007

ISA Server Domain Member or Workgroup member??

This question is most common when you have Microsoft ISA server to be deployed in your organization....

Author: TechNet Archive Date: 12/18/2007

Back to Back Firewall - ISA Server

Back to Back firewall model which most of the companies will prefer because of easy design and...

Author: TechNet Archive Date: 12/18/2007

Domain Isolation - IPSEC

Domain isolation is to mitigate the threat posed by unauthorized access to a trusted computer by an...

Author: TechNet Archive Date: 12/18/2007

RADIUS Proxy in Perimeter Network (ISA server 2006)

RADIUS Proxy in Perimeter Network (ISA server) Scenario ====== You have RADIUS Proxy server in...

Author: TechNet Archive Date: 07/02/2007

Protecting against Brute Force Attack

Protecting against Brute Force Attack Brute force attacke which is also known as Dictionary attack...

Author: TechNet Archive Date: 06/07/2007

Complete Step to Step for Guide to Migrate from Exchange 5.5 to Exchange 2003

Tested: Yes Results: Successful    Windows NT:  PDC machine named ENT1, NETBIOS name DC1201 BDC...

Author: TechNet Archive Date: 05/14/2007

Changing the default location for documents and settings for Terminal Server Users

There is a registry setting which you may do in order to change the default location of Documents...

Author: TechNet Archive Date: 02/28/2007

Adding Custom Attributes in Active Directory

Adding Custom Attributes in Active Directory Pre-requisites Enable Schema Updates by Means of the...

Author: TechNet Archive Date: 02/18/2007