THE WHATIS.COM WORD-OF-THE-DAY   
November 19, 2002

ISA Server 
______________
TODAY'S SPONSOR: VeriSign - The Value of Trust

Secure all your Web servers now - with a proven 5-part strategy.    
The FREE Server Security Guide shows you how to:
- DEPLOY THE LATEST ENCRYPTION and authentication techniques       
- DELIVER TRANSPARENT PROTECTION with the strongest security without
disrupting users. And more. 

Get your FREE Guide now: http://WhatIs.com/r/0,,7629,00.htm?freeguide

______________   
TODAY'S WORD: ISA Server 

See our definition with hyperlinks at 
http://searchwin2000.techtarget.com/sDefinition/0,,sid1_gci864220,00.html

Microsoft's ISA Server (Internet Security and Acceleration Server) is
the successor to Microsoft's Proxy Server 2.0 and is part of
Microsoft's .NET support. ISA Server provides the two basic services
of an enterprise firewall and a Web proxy/cache server. ISA Server's
firewall screens all packet-level, circuit-level, and
application-level traffic. The Web cache stores and serves all
regularly accessed Web content in order to reduce network traffic and
provide faster access to frequently-accessed Web pages. ISA Server
also schedules downloads of Web page updates for non-peak times. 

ISA Server allows administrators to create policies for regulating
usage based on user, group, application, destination, schedule, and
content type criteria. ISA Server is designed to work with Windows
2000 and later operating systems and to take advantage of Windows'
Kerberos security. ISA Server includes a software development kit
(SDK). 

ISA Server comes in two editions, Standard Edition and Enterprise
Edition. Standard Edition is a stand-alone server that supports up to
four processors. Enterprise Edition is for large-scale deployments,
server array support, multi-level policy, and computers with more
than four processors. Licenses are based on the number of processors.

RELATED TERMS:

proxy server 
http://whatis.techtarget.com/definition/0,,sid9_gci212840,00.html

cache server
http://whatis.techtarget.com/definition/0,,sid9_gci211731,00.html

.NET 
http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci342248,00.html

firewall 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html

Kerberos 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212437,00.html

______________________
SELECTED LINKS

Microsoft provides more information on its ISA Server page.
http://www.microsoft.com/isaserver/

WindowsAdvantage.com has an article that compares ISA Server to the
Proxy Server.
http://www.windowsadvantage.com/features/02-12-01_acceleration_server.asp

SearchSystemsManagement offers links to more about Web server
security.
http://searchsystemsmanagement.techtarget.com/bestWebLinks/0,289521,sid20_tax292688,00.html

SearchWin200.com offers a portal for more about security, firewalls,
proxy servers, and related topics.
http://searchwin2000.techtarget.com/bestWebLinks/0,289521,sid1_tax559,00.html

______________________
QUIZ #6 | Servers

How much do you know about the client/server model? Take our latest
quiz and find out.

>> Take the quiz
http://whatis.techtarget.com/definition/0,,sid9_gci556836,00.html

______________________
CROSSWORD PUZZLE #6 | Wireless 

Improve your flexible thinking skills. Print out the puzzle and keep
it nearby to work on throughout your day!
http://whatis.techtarget.com/definition/0,,sid9_gci861329,00.html

______________________
REAL-LIFE CHALLENGE #19 | People problems

Sometimes, the toughest IT-related problems have nothing to do with
hardware or software. They're people problems. Susan is upset that
her supervisor won't go to bat for her. Can you offer advice?
http://whatis.discussions.techtarget.com/WebX?[EMAIL PROTECTED]@.1dcfae0e/160!viewtype=threadDate&skip=&expand=

______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] Faraday constant  
http://whatis.techtarget.com/definition/0,,sid9_gci863897,00.html 

[2] glassfet 
http://whatis.techtarget.com/definition/0,,sid9_gci863813,00.html 

[3] public land mobile network 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci863525,00.html 

[4] antipattern  
http://searchvb.techtarget.com/sDefinition/0,,sid8_gci863345,00.html 

[5] write-only code 
http://searchvb.techtarget.com/sDefinition/0,,sid8_gci863343,00.html 

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

LOWELL THING, Site Editor ([EMAIL PROTECTED])
____________________________________________________________________

MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED])
___________________________________________________________________
::::::::::::::::::::  ABOUT THIS NEWSLETTER   :::::::::::::::::::::

Published by TechTarget (http://www.techtarget.com)
 TechTarget - The Most Targeted IT Media
 Copyright 2002, All Rights Reserved.

If you would like to sponsor this or any TechTarget newsletter,
please contact Gabrielle DeRussy at [EMAIL PROTECTED]
Unsubscribe from 'Word of the Day'
 - Simply Reply to this Email with REMOVE within the Body or Subject
>  or
 - Go to: http://WhatIs.techtarget.com/register
 - Log in to edit your profile.
 - Click on the link to Edit email subscriptions.
 - Uncheck the box next to the newsletter you wish 
   to unsubscribe from.
 - When finished, click "Save Changes to My Profile."


Reply via email to