skip to main content
Home » F5 Resources » F5 White Papers » F5 White Papers on integrating Microsoft Applications

Accelerating Mobile Access

Access Control in a Mobile World

Adaptable and Resilient VDI Deployments

Application Security in the Cloud with BIG-IP® ASM®

APT Dot Gov: Protecting Federal Systems from Advanced Threats | SANS White Paper

Authentication 101

Automating F5® Application Services for VMware with F5 BIG-IQ® Cloud

Automating the Data Center

BIG-IP Virtual Edition Products, The Virtual ADCs Your Application Delivery Network Has Been Missing

Controlling the Cloud: Requirements for Cloud Computing

Cookies, Sessions, and Persistence

DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks

Enhancing VMware Horizon View with F5 Solutions

F5 and Windows Server 2012 DirectAccess/Remote Access Services

F5 iControl®

Filling the Threat Management Gateway Void with F5

Five Ways F5 Improves XenApp or XenDesktop Implementations

Fundamentals of HTTP

Get to Know GPO

Hardware Load Balancing for Optimal Microsoft Exchange Server 2010 Performance

How to Future-Proof Application Delivery

Improving VDI with Scalable Infrastructure

Kerberos Constrained Delegation and Protocol Transition in Smart Card PKI Architecture

Managing the Migration to IPv6 Throughout the Service Provider Network

Microsoft Hyper-V Network Virtualization and the BIG-IP System

Mitigating DDoS Attacks with F5 Technology

Offloading Remote Authentication for Servers

Operationalizing Elastic Applications

Post-TMG: Securely Delivering Microsoft Applications

Replacing Abstract Zones with Real Application Security Policy

ScaleN®: Elastic Infrastructure

Secure Access with the BIG-IP System

Secure iPhone Access to Corporate Web Applications

Security Solutions for Messaging Systems

Seven Data Center Challenges to Consider Before Going Virtual

Simplifying Single Sign-On with F5 BIG-IP APM® and Active Directory

SOA: Challenges and Solutions

The DDoS Threat Spectrum

The Dynamic DNS Infrastructure

The F5 Application Availability Between Hybrid Data Centers Reference Architecture

The F5 Application Services Reference Architecture

The Programmable Network

The Shortfall of Network Load Balancing

Things to consider when moving to Exchange 2013 | Convergent Computing White Paper

Top Considerations When Choosing an ADC

Understanding Advanced Data Compression

Unified Application and Data Delivery

Unified Enterprise Mobility with the F5 BIG-IP System

Virtualization Defined – Eight Different Ways

Why You Need a Cloud to Call your Own