Configuring protection from web-based threats

Updated: February 1, 2011

Applies To: Forefront Threat Management Gateway (TMG)

The following topics describe how to protect your organization from malware and other Web-based threats:

  • Configuring malware inspection—Describes how to enable and configure the inspection of user-requested Web pages and files for harmful content.

  • Configuring HTTPS inspection—Describes how to enable inspection of outbound HTTPS traffic, in order to protect your organization from security risks inherent to Secure Sockets Layer (SSL) tunnels.

  • Configuring HTTP filtering—Describes how to configure the application-layer HTTP filter to allow only HTTP traffic that complies with your corporate policy and security needs.


Protecting your networks