?
Solved

Forefront Threat Management Gateway 2010

Posted on 2011-03-17
1
Medium Priority
?
1,010 Views
Last Modified: 2013-11-16
Some questions about TMG 2010:

1.  Does it do in-depth reporting on IP addresses from the internal network, so that I can see internet bandwidth usage, and all url's visited.  For example, I would like to know if a user was accessing skype and did 100MB using that application, or went to youtube and did 200MB from that site.

2.  Can TMG 2010 block url categories like social networking, or must I define all urls that are blocked?

3.  Can TMG 2010 be setup in a bridged network mode?

4.  Does TMG 2010 do web caching?  If bridged network mode is an option, will web caching working in bridged mode?
0
Comment
Question by:hbcit
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 2000 total points
ID: 35155549
No - FTMG has no interest in bandwidth usage. If you want that, buy a plug in such as bandwidth splitter.
Yes - FTMG supports - and comes with - a large number of categories already defined by group. Up to you if you subscribe to the update service.
No - FTMG is not designed to work in bridged mode. Each interface must be on a separate network subnet.
Yes- it supports web caching.
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question