Last post Sep 23, 2010 09:41 AM by boatboy
Sep 20, 2010 10:24 AM|boatboy|LINK
Does this exploit affect ISA, TMG, and UAG?
Similarly, are there rules that can be set up to prevent this exploit?
Sep 23, 2010 04:44 AM|Hua-Jun Li - MSFT|LINK
You only use TMG whenever you need to control internet access and protect your corporate internet users from web based malware. You use UAG whenever you need access to your corporate published resources like OWA, Outlook anywhere, remote apps, etc. if you
need both kinds of access you will have to install both products the TMG and UAG.
Please check the following link:
Sep 23, 2010 09:41 AM|boatboy|LINK
That does not answer my question. I know what the products are. I'm asking if they are affected by this latest security vulnerability.