{"id":5094,"date":"2012-02-13T19:47:27","date_gmt":"2012-02-13T18:47:27","guid":{"rendered":"http:\/\/www.it-training-grote.de\/blog\/?p=5094"},"modified":"2012-02-13T19:58:50","modified_gmt":"2012-02-13T18:58:50","slug":"celestix-msa-tmg-best-practice-workshop-wick-hill-gmbh","status":"publish","type":"post","link":"https:\/\/www.it-consulting-grote.de\/blog\/?p=5094","title":{"rendered":"Celestix MSA &#8211; TMG Best Practice Workshop &#8211; Wick Hill GmbH"},"content":{"rendered":"<p>Hallo Leutz,<\/p>\n<p>am 30.03.2012 darf ich fuer die Wick Hill GmbH in Hamburg einen Forefront TMG Best Practice Workshop halten.<br \/>\nInhalte:<br \/>\n&#8211; Celestix Hardware und deren Mehrwerte im \u00dcberblick<br \/>\n&#8211; Aus der Praxis f\u00fcr die Praxis, alle wichtigen Kniffe f\u00fcr eine schnelle Inbetriebnahme<br \/>\n&#8211; Publishing Exchange Services Best Practices (HTTP to HTTPS redirection, \/Path Redirection, Fine Grained Password Policies f\u00fcr OWA Users from Internet)<br \/>\n&#8211; Sharepoint Publishing with AAM<br \/>\n&#8211; Publishing Remote Desktop Gateway with KCD<br \/>\n&#8211; TMG Logging Best Practice (Garbage Rule \/ Log Optimization)<br \/>\n&#8211; TMG Debugging with TMG Data Packager and TMG Diagnostic Logging<br \/>\n&#8211; TMG Features (Web Access Policy \/ HTTPS Inspection \/ Malware Inspection \/ Intrusion Prevention System) und ihre Funktionsweise<\/p>\n<p>Detaillierte Agenda: <a href=\"http:\/\/www.it-training-grote.de\/download\/WH-Agenda-CEL-TMG-WS.pdf\">http:\/\/www.it-training-grote.de\/download\/WH-Agenda-CEL-TMG-WS.pdf<\/a>\u00a0(Original steht auf der Wick Hill Webseite zur Verfuegung, da der Link aber recht lang ist, steht die Agenda auch hier zur Verfuegung)<br \/>\nWeitere Informationen und Anmeldung: <a href=\"http:\/\/www.wickhill.de\/\">http:\/\/www.wickhill.de\/<\/a><\/p>\n<p>Gruss Marc<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hallo Leutz, am 30.03.2012 darf ich fuer die Wick Hill GmbH in Hamburg einen Forefront TMG Best Practice Workshop halten. Inhalte: &#8211; Celestix Hardware und deren Mehrwerte im \u00dcberblick &#8211; Aus der Praxis f\u00fcr die Praxis, alle wichtigen Kniffe f\u00fcr &hellip; <a href=\"https:\/\/www.it-consulting-grote.de\/blog\/?p=5094\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[52,48,10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.it-consulting-grote.de\/blog\/index.php?rest_route=\/wp\/v2\/posts\/5094"}],"collection":[{"href":"https:\/\/www.it-consulting-grote.de\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.it-consulting-grote.de\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.it-consulting-grote.de\/blog\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.it-consulting-grote.de\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5094"}],"version-history":[{"count":5,"href":"https:\/\/www.it-consulting-grote.de\/blog\/index.php?rest_route=\/wp\/v2\/posts\/5094\/revisions"}],"predecessor-version":[{"id":5099,"href":"https:\/\/www.it-consulting-grote.de\/blog\/index.php?rest_route=\/wp\/v2\/posts\/5094\/revisions\/5099"}],"wp:attachment":[{"href":"https:\/\/www.it-consulting-grote.de\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.it-consulting-grote.de\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.it-consulting-grote.de\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}