Forefront Unified Access Gateway Beta Released

Microsoft rolled out beta 2 of its Forefront Unified Access Gateway (UAG) enterprise security solution this week.

This latest release will support streamlined security features in Windows 7, and Windows Server 2008 R2, according to a Forefront team blog.

Formerly known as "Intelligent Application Gateway," UAG consolidates access technologies such as Secure Socket Layer Virtual Private Network (SSL VPN), Remote Desktop, Web publishing and Direct Access--all "under one roof," according to the blog. It allows administrators to manage access rights for all types of clients, including corporate laptops, home PCs, kiosks, PDAs and even borrowed PCs.

"The SSL VPN capability of UAG will allow organizations to enable remote access for only specific applications, or file systems, rather than to entire networks," noted Donald S. Retallack, Ph.D., research vice president for systems management and security at Directions on Microsoft, in an e-mail.

That capability can reduce an organization's exposure to compromised clients and attackers, Retallack explained. UAG will also include support for configuring and managing the new DirectAccess feature in Windows 7 and Windows Server 2008 R2. DirectAccess helps connect remote clients to a corporate network.

UAG provides multiple levels of remote access tailored to the user's profile and the machine being used, according to the blog. Specific levels of security are assigned on the fly according to the security level of the machine. A corporate machine may get full connectivity, while a borrowed PC will be scanned for up-to-date antimalware software before being assigned a level of access. UAG can block access to uploads and downloads for suspect client machines.

UAG promises IT pros the ability to quickly set up network access for users on nearly any machine, according to Microsoft.

"One of the advancements of UAG is that it does not require the slow and often unreliable process of setting up and managing specialized VPN client software on the end user's computer," stated Retallack. "Instead, users connect using a standard Web browser."

About the Author

Herb Torrens is an award-winning freelance writer based in Southern California. He managed the MCSP program for a leading computer telephony integrator for more than five years and has worked with numerous solution providers including HP/Compaq, Nortel, and Microsoft in all forms of media. You can contact Herb here.

Featured

  • illustration of a human head with a glowing neural network in the brain, connected to tech icons on a cool blue-gray background

    Meta Introduces Stand-Alone AI App

    Meta Platforms has launched a stand-alone artificial intelligence app built on its proprietary Llama 4 model, intensifying the competitive race in generative AI alongside OpenAI, Google, Anthropic, and xAI.

  • illustration of an open book with lines and circles around it

    Foundations in Learning Launches Fluency for All Movement

    Ed tech company Foundations in Learning, creator of the WordFlight literacy assessment and intervention for students in grades 3-8, has kicked off a new movement aimed at improving reading literacy.

  • Stylized illustration showing cybersecurity elements like shields, padlocks, and secure cloud icons on a neutral, minimalist digital background

    Microsoft Announces Host of Security Advancements

    Microsoft has announced major cybersecurity advancements across its product portfolio and practices. The work is part of its Secure Future Initiative (SFI), a multiyear cybersecurity transformation the company calls the largest engineering project in company history.

  • cloud icon with a padlock overlay set against a digital background featuring binary code and network nodes

    Cloud Security Auditing Tool Uses AI to Validate Providers' Security Assessments

    The Cloud Security Alliance has unveiled a new artificial intelligence-powered system that automates the validation of cloud service providers' (CSPs) security assessments, aiming to improve transparency and trust across the cloud computing landscape.