Solved

Forefront Threat Management Gateway 2010

Posted on 2011-03-17
1
1,007 Views
Last Modified: 2013-11-16
Some questions about TMG 2010:

1.  Does it do in-depth reporting on IP addresses from the internal network, so that I can see internet bandwidth usage, and all url's visited.  For example, I would like to know if a user was accessing skype and did 100MB using that application, or went to youtube and did 200MB from that site.

2.  Can TMG 2010 block url categories like social networking, or must I define all urls that are blocked?

3.  Can TMG 2010 be setup in a bridged network mode?

4.  Does TMG 2010 do web caching?  If bridged network mode is an option, will web caching working in bridged mode?
0
Comment
Question by:hbcit
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 35155549
No - FTMG has no interest in bandwidth usage. If you want that, buy a plug in such as bandwidth splitter.
Yes - FTMG supports - and comes with - a large number of categories already defined by group. Up to you if you subscribe to the update service.
No - FTMG is not designed to work in bridged mode. Each interface must be on a separate network subnet.
Yes- it supports web caching.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question