Solved

Drawback of having my TMG cluster connected to the domain.

Posted on 2010-09-01
4
882 Views
Last Modified: 2012-05-10
Hi,

I have just build a TMG cluster, I will be moving it into our DMZ but was wondering if I should connect it to the domain or not. Any reason why I should NOT connect my TMG setup to the domain?

Mostly I want to know about the security reasons behind why not to do it.

Thanks
0
Comment
Question by:reactionz
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 33574349
Best practice is to connect it to the domain everytime
Keith
0
 

Author Comment

by:reactionz
ID: 33574357
Thanks for that. Is there any documentation outlining this at all that I can look at and show to the powers-that-be?

I tried to look but can't find anything.
0
 
LVL 4

Expert Comment

by:kurian2z5
ID: 33574588
There was an article by one of the Microsoft guys regarding why ISA server should be connected to the domain. In the end, there are no security issues and you can assign domain user level access.
0
 
LVL 4

Accepted Solution

by:
kurian2z5 earned 50 total points
ID: 33574636
0

Featured Post

Is Your AD Toolbox Looking More Like a Toybox?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article runs through the process of deploying a single EXE application selectively to a group of user.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question