Figure 1: ADAMSITES tool
Auto Discovery Configuration
Auto-Discovery Configuration can be used to configure Active Directory with a marker key that points to your Forefront TMG server. This marker key is used by the TMG client (formerly the Firewall client) to locate the Forefront TMG server and connect to it. This is a completely different and safer method than using DHCP / DNS in finding Forefront TMG servers. If no marker for the Active Directory key is found, the Forefront TMG client will return to using DHCP / DNS to find the Forefront TMG server.
Cache Directory
Using Cache Directory can view the cache contents in real time, save the current cache information to the file and mark the obsolete items that should not be stored in the cache. Cachedir utility in our opinion is the most desirable utility from the Forefront TMG SDK and is also available in the previous ISA Server version. Before you can use this Cachedir tool, you need to copy the CACHEDIR.EXE file to the Forefront TMG installation directory.
CertTool
Certtool for TMG is only required when you use Forefront TMG Enterprise in a workgroup environment. In a workgroup environment, TMG servers communicate with each other using certificates. Certtool makes it easy to enforce installation or replace certificates in Forefront TMG. Before using Certtool for TMG, you need to copy the ISACERTTOOL.EXE file to the Forefront TMG installation directory.
DNS Cache
Using the DNS Cache on the Forefront TMG server can display the contents of the Domain Name System (DNS) cache and delete entries in the DNS cache. For example, Forefront TMG clients use Forefront TMG DNS settings for name resolution, and Secure NAT clients use local DNS settings to resolve names. In some cases it may be necessary to delete the DNS Cache settings on Forefront TMG.
Note : Deleting the DNS cache on the TMG server with the IPCONFIG / FLUSHDNS command will only delete the DNS Cache from the DNS client resolver.
To be able to use the DNS Cache tool, copy the DNSTOOLS.EXE file to the Forefront TMG installation directory.
EE Single Server Conversion
Using this tool (EESingleServerConversion.exe) can help you switch from an independent server running ISA Server 2004 Enterprise Edition or ISA Server 2006 Enterprise Edition to Forefront TMG also in standalone mode. Before importing the configuration of ISA Server Enterprise into Forefront TMG Enterprise in standalone mode, Standalone Mode, you must convert other XML settings from the export format of the ISA Server into a readable format for importing the configuration into Forefront TMG Enterprise. After installing this converter and copying the ISA Enterprise configuration file to the Forefront TMG server, open the command prompt and enter the command with the source and target XML file as shown in the figure below.
This command will convert the ISA Server Enterprise configuration file to the supported format on Forefront TMG Enterprise independently.
MSDEToText
The MSDEtoText tool can be used to convert Forefront TMG SQL Express Server logs into a text file, or to display their contents so the screen. You can use the MSDEtoText utility with ISA Server 200x and Forefront TMG. The following figure shows the syntax of the MSDEtoText tool.
The figure below shows an example of exporting the Firewall log file.
Remote Access Quarantine
Forefront TMG also supports the Remote Access Quarantine service, the service used in ISA Server 200x, to quarantine VPN clients connected to ISA Server. You should use NAP (Network Access Protection) of Windows Server 2008 in combination with Forefront TMG, which allows you to more easily and flexibly configure RQS components from the TMG SDK.
RSA Test Authentication
The RSA Test Authentication utility can be used to verify that a computer running Forefront TMG can authenticate to a computer running RSA Authentication Manager. To use the RSA Test Authentication utility, copy the SDTEST.EXE and SDUI.DLL files to the Forefront TMG installation directory.
Upgrade the Security Configuration Wizard (SCW) for Forefront TMG Standard and Enterprise versions
Windows Server 2008 and Windows Server 2008R2 have integrated a tool called the Security Configuration Wizard (SCW). This tool can be used to simplify the task of "hardening" the underlying operating system during preparation of deploying Forefront TMG. The SCW will create a policy to configure services, registry settings, authentication policies, and . based on the roles and features installed. By default, SCW does not know that Forefront TMG is installed. The Forefront TMG SDK comes with an extension of SCW.
There are two files to be copied into the WindowsSecurityMsscwkbs folder:
Then open the command prompt and enter the following command: scwcmd register / kbname: TMG /kbfile:SCW_TMG_W2K8R2_SP0.xml
Then create a new Security policy and the SCW will see the roles installed on the Forefront TMG server.
Forefront TMG 2010 SDK
Forefront TMG SDK has a useful ISASDK.CHM file, which contains a lot of technical information about Forefront TMG and some examples to develop Application and Web filters in Forefront TMG.
ISASDK.CHM
The ISASADK.CHM file contains information about the Forefront TMG architecture and its subsystems, as well as some example code that helps configure and extend programming capabilities for Forefront TMG.
Samples / Admin directory
There are many useful VBS scripts in the samples / Admin directory installed by the Forefront TMG SDK installation routine. In this article, we will show you two examples. The first scenario is HTTPFilteconfig.vbs, the script can be used to import or export HTTP filter settings from a firewall policy policy.
Another script is called ActiveSession.vbs, which gives you an overview of the current connection sessions on Forefront TMG.