Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Updated: February 1, 2011
Applies To: Forefront Threat Management Gateway (TMG)
The following topics are designed to help you plan how to use Forefront TMG to protect your organization from malware and other Web-based threats:
Related Topics
Concepts
Configuring protection from web-based threats
Protection design guide for Forefront TMG