Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Drawback of having my TMG cluster connected to the domain.

Posted on 2010-09-01
4
Medium Priority
?
888 Views
Last Modified: 2012-05-10
Hi,

I have just build a TMG cluster, I will be moving it into our DMZ but was wondering if I should connect it to the domain or not. Any reason why I should NOT connect my TMG setup to the domain?

Mostly I want to know about the security reasons behind why not to do it.

Thanks
0
Comment
Question by:reactionz
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 33574349
Best practice is to connect it to the domain everytime
Keith
0
 

Author Comment

by:reactionz
ID: 33574357
Thanks for that. Is there any documentation outlining this at all that I can look at and show to the powers-that-be?

I tried to look but can't find anything.
0
 
LVL 4

Expert Comment

by:kurian2z5
ID: 33574588
There was an article by one of the Microsoft guys regarding why ISA server should be connected to the domain. In the end, there are no security issues and you can assign domain user level access.
0
 
LVL 4

Accepted Solution

by:
kurian2z5 earned 200 total points
ID: 33574636
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question