UAG does not detect FW in Windows 10

Just upgraded my client to Windows 10 and discovered that UAG does not really like my client anymore.

The new Edge browser isn’t supported at all if client components are required.
If I start my IE11 on my Windows 10 client UAG fails to detect the FireWall causing all access requiring a compliant FW to fail.
UAGFindNoFWonWin10
If your clients start using Windows 10 you might need to remove any requirements for FW in your UAG policies.

Using smart links in UAG 2010 might cause URL is to long error

When you start to use ADFS with your UAG and also start to use Azure or Office 365 you might come up with the idea of “publishing” your Office 365 SharePoint site in the UAG portal. This can be done using what is called a Smart Link.

But when you add your smart link as an application in your UAG you can easily end-up with breaking the UAG Portal and getting a URL is to long error message.
UAG-Error-URLIsToLong
This happens because you have associated your application with the federation URL by adding your ADFS server as the Web Server in your application.
UAG-Error-UsingSTSasWebServer
This is an easy misstake to make since the Smart Link starts with something like “https://sts.company.com/adfs/ls…”.

What you need to do is put a “dummy” value in the Web Server setting of the application. This value however needs to be resolvable to an IP address by UAG. One way of solving that is to put the “dummy” value in the hosts file of the UAG and put a “dummy” IP-address on it.
Now you can put the Smart Link URL as the Portal Link in your application and the UAG Portal now contains an application that in fact is hosted in Office 365 but still gives SSO due to ADFS authentication.

UAG 2010 unable to activate after removing DirectAccess

Many customers that used UAG 2010 for DirectAccess is in the process of replacing it with DirectAccess in Windows Server 2012 (or 2012 R2). One issue with this is that once UAG has been your DA server it has a hard time forgetting it.

Today I stumbled upon such a case. UAG had not been used for DA for 6 months and DirectAccess had been disabled following the official TechNet article on how to disable and enable DA in UAG.

Now however they started to clean-up some more. Removing the IP-HTTPS certificate and the IP addresses used by DA in UAG. When they did UAG failed to activate the DirectAccess configuration!

The solution to this problem is to remove a small file on the UAG server that holds information about the DA IP addresses and certificates. The file you need to remove is the uagda.config file located in the common\conf folder of your UAG installation.

After deleting the file your UAG should activate just fine again.

Fixing Windows 8.1 access in UAG 2010 can cause Error 500

In my tweets or searching the Internet you might have learned that UAG 2010 SP3 will detect Windows 8.1 clients as mobile devices.
The not supported solution presented by Risual forgets to notify you that you need to make the change in both the InternalSite web.config as well as in the PortalHomePage web.config. This is documented in the official TechNet article on how to modify the DetectionExpression.
However, they both fail to tell you that the modifications you make in the web.config files might cause your UAG 2010 to start showing IIS Error 500.
IISServerError500
The reason is obvious if your a programmer but maybe not if your a typical IT-pro.
When following the guide from Risual for example and adding the line <DetectionExpression Name="IE11" Expression='UserAgent Contains "mozilla" AND UserAgent Contains "rv:11"' DefaultValue="false" /> you have to remember to add that line BEFORE you refer to it in a line like <DetectionExpression Name="Mobile" Expression='!IE11 AND (MobileDevice OR WindowsCE)' DefaultValue="false" />

Microsoft Forefront UAG Mobile Configuration Starter

Are you planning to allow mobile devices in your company and realize you need a secure way of publishing the resources that the clients will access?

Well then I suggest you take a look at the Microsoft Forefront Mobile Configuration Starter book written by Fabrizio Volpe. In this book Fabrizio gives you an easy to follow guideline to get you started with using UAG as your mobile access solution. He also gives you many pointers to resources where you can dig deeper into the mystery of allowing mobile devices access to your internal resources.

I also recommend you take a look at my earlier post on how to use KCD to secure your infrastructure where i discuss how KCD can be used to secure mobile device access.

Server 2012 Unified Remote Access Book

Erez Ben Ari and Bala Natarajan have written a new book about Unified Remote Access in Windows Server 2012. This explains how Direct Access in Server 2008 R2, combined with Forefront UAG, might be replaced by Unified Remote Access in Windows Server 2012.

Server 2012 Unified Remote Access Book

Windows Server 2012 Unified Remote Access Planning and Deployment Book

You can get the book from Packt Publishing.

Microsoft announcing UAG 2010 SP3

Microsoft have just announced that UAG 2010 SP3 will come in Q1 2013.

The SP3 will add support for:

  • Windows 8 with Internet Explorer 10 clients
  • Office 2013 clients (e.g. Outlook, Word, Excel, PowerPoint)
  • Publishing Exchange 2013
  • Publishing SharePoint 2013
  • RDP 8.0 client for Windows 7 SP1

Does UAG activation disconnect users?

A common question for all UAG administrators is if activating the configuration will affect users currently using the UAG.

Erez Ben-Ari (co-author of the books Microsoft Forefront UAG 2010 Administrator’s Handbook and Mastering Microsoft Forefront UAG 2010 Customization) have given a very clear answer to that question.

Normally, it does not. The exceptions are:

  1. SSL-VPN tunnels do get severed during an activation, so anyone using those will be disconnected and need to re-launch the tunnel.
  2. Occasionally, UAG might detect that IIS is not responding, and issue an IISRESET. That would effectively terminate all sessions. It’s pretty rare to happen, though.
  3. The labor involved with the process can make the servers less responsive to some degree. Usually, it’s barely noticeable, though.

Bottom line is that activating a new configuration should in normal case not affect the users running applications published in UAG.

TMG available as SecureGuard appliance after Dec 1

In this Announcement Availability of Microsoft Forefront TMG 2010 on SecureGUARD Appliance Series from SecureGuard we can read that. “As announced by the Microsoft Server & Cloud Blog, Microsoft Forefront TMG 2010 will be discontinued and will be no longer available for purchase as of Dec. 1, 2012. Nevertheless SecureGUARD Appliances with TMG 2010 licenses will be available for purchase significantly longer than Dec. 1, 2012.”

My supplier tells me that SecureGuard at the moment plans to support their TMG appliances until 2023.

Read about all SecureGuard appliances and offerings on http://www.secureguard.de

Interested in buying SecureGuard appliances? Contact me at kent@xpservices.se or just comment on this post.

Thanks to ISA and TMG teams

I just want to take this opportunity to say thanks to everyone that over the years have worked with ISA and TMG. Having myself worked with ISA and TMG since beta of ISA 2000 I can only say… You all did a fantastic job, making ISA and TMG one the best firewalls on the market. Thank you!