In the first article in our series, we will follow the best practices and lay out our topology for the two-server installation of Microsoft Forefront Client Security servers. Then we will continue with component selection and finally installation settings for each server.
Peer to peer (P2P) activities are very popular since the launch of Napster in May 1999. Controversies on the legal issues aside, P2P programs put a very heavy load on networks. Inside we discuss the ways to detect P2P activities on a network.