Solved

Drawback of having my TMG cluster connected to the domain.

Posted on 2010-09-01
4
880 Views
Last Modified: 2012-05-10
Hi,

I have just build a TMG cluster, I will be moving it into our DMZ but was wondering if I should connect it to the domain or not. Any reason why I should NOT connect my TMG setup to the domain?

Mostly I want to know about the security reasons behind why not to do it.

Thanks
0
Comment
Question by:reactionz
  • 2
4 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 33574349
Best practice is to connect it to the domain everytime
Keith
0
 

Author Comment

by:reactionz
ID: 33574357
Thanks for that. Is there any documentation outlining this at all that I can look at and show to the powers-that-be?

I tried to look but can't find anything.
0
 
LVL 4

Expert Comment

by:kurian2z5
ID: 33574588
There was an article by one of the Microsoft guys regarding why ISA server should be connected to the domain. In the end, there are no security issues and you can assign domain user level access.
0
 
LVL 4

Accepted Solution

by:
kurian2z5 earned 50 total points
ID: 33574636
0

Featured Post

Is Your AD Toolbox Looking More Like a Toybox?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have been asked to explain on many, many occasions the correct way to setup network cards and DNS settings on ISA Server 2004, 2006 and forefront Threat management gateway (FTMG) and have willing done so. I have also promised my self everytime tha…
Mapping Drives using Group policy preferences Are you still using old scripts to map your network drives if so this article will show you how to get away for old scripts and move toward Group Policy Preference for mapping them. First things f…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now