THE WHATIS.COM WORD-OF-THE-DAY November 19, 2002 ISA Server ______________ TODAY'S SPONSOR: VeriSign - The Value of Trust
Secure all your Web servers now - with a proven 5-part strategy. The FREE Server Security Guide shows you how to: - DEPLOY THE LATEST ENCRYPTION and authentication techniques - DELIVER TRANSPARENT PROTECTION with the strongest security without disrupting users. And more. Get your FREE Guide now: http://WhatIs.com/r/0,,7629,00.htm?freeguide ______________ TODAY'S WORD: ISA Server See our definition with hyperlinks at http://searchwin2000.techtarget.com/sDefinition/0,,sid1_gci864220,00.html Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.0 and is part of Microsoft's .NET support. ISA Server provides the two basic services of an enterprise firewall and a Web proxy/cache server. ISA Server's firewall screens all packet-level, circuit-level, and application-level traffic. The Web cache stores and serves all regularly accessed Web content in order to reduce network traffic and provide faster access to frequently-accessed Web pages. ISA Server also schedules downloads of Web page updates for non-peak times. ISA Server allows administrators to create policies for regulating usage based on user, group, application, destination, schedule, and content type criteria. ISA Server is designed to work with Windows 2000 and later operating systems and to take advantage of Windows' Kerberos security. ISA Server includes a software development kit (SDK). ISA Server comes in two editions, Standard Edition and Enterprise Edition. Standard Edition is a stand-alone server that supports up to four processors. Enterprise Edition is for large-scale deployments, server array support, multi-level policy, and computers with more than four processors. Licenses are based on the number of processors. RELATED TERMS: proxy server http://whatis.techtarget.com/definition/0,,sid9_gci212840,00.html cache server http://whatis.techtarget.com/definition/0,,sid9_gci211731,00.html .NET http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci342248,00.html firewall http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html Kerberos http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212437,00.html ______________________ SELECTED LINKS Microsoft provides more information on its ISA Server page. http://www.microsoft.com/isaserver/ WindowsAdvantage.com has an article that compares ISA Server to the Proxy Server. http://www.windowsadvantage.com/features/02-12-01_acceleration_server.asp SearchSystemsManagement offers links to more about Web server security. http://searchsystemsmanagement.techtarget.com/bestWebLinks/0,289521,sid20_tax292688,00.html SearchWin200.com offers a portal for more about security, firewalls, proxy servers, and related topics. http://searchwin2000.techtarget.com/bestWebLinks/0,289521,sid1_tax559,00.html ______________________ QUIZ #6 | Servers How much do you know about the client/server model? Take our latest quiz and find out. >> Take the quiz http://whatis.techtarget.com/definition/0,,sid9_gci556836,00.html ______________________ CROSSWORD PUZZLE #6 | Wireless Improve your flexible thinking skills. Print out the puzzle and keep it nearby to work on throughout your day! http://whatis.techtarget.com/definition/0,,sid9_gci861329,00.html ______________________ REAL-LIFE CHALLENGE #19 | People problems Sometimes, the toughest IT-related problems have nothing to do with hardware or software. They're people problems. Susan is upset that her supervisor won't go to bat for her. Can you offer advice? http://whatis.discussions.techtarget.com/WebX?[EMAIL PROTECTED]@.1dcfae0e/160!viewtype=threadDate&skip=&expand= ______________________________ RECENT ADDITIONS AND UPDATES [1] Faraday constant http://whatis.techtarget.com/definition/0,,sid9_gci863897,00.html [2] glassfet http://whatis.techtarget.com/definition/0,,sid9_gci863813,00.html [3] public land mobile network http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci863525,00.html [4] antipattern http://searchvb.techtarget.com/sDefinition/0,,sid8_gci863345,00.html [5] write-only code http://searchvb.techtarget.com/sDefinition/0,,sid8_gci863343,00.html ____________________________________________________________________ ::::::::::::::::::: WHATIS.COM CONTACTS ::::::::::::::::::: LOWELL THING, Site Editor ([EMAIL PROTECTED]) ____________________________________________________________________ MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED]) ___________________________________________________________________ :::::::::::::::::::: ABOUT THIS NEWSLETTER ::::::::::::::::::::: Published by TechTarget (http://www.techtarget.com) TechTarget - The Most Targeted IT Media Copyright 2002, All Rights Reserved. If you would like to sponsor this or any TechTarget newsletter, please contact Gabrielle DeRussy at [EMAIL PROTECTED] Unsubscribe from 'Word of the Day' - Simply Reply to this Email with REMOVE within the Body or Subject > or - Go to: http://WhatIs.techtarget.com/register - Log in to edit your profile. - Click on the link to Edit email subscriptions. - Uncheck the box next to the newsletter you wish to unsubscribe from. - When finished, click "Save Changes to My Profile."