Solved

ISA Proxy configuration

Posted on 2004-03-23
6
641 Views
Last Modified: 2013-11-16
I am using ISA Proxy server running on Win2K. Seems so far so good. Anybody knows how I can use the content filtering features to block unwanted sites? or is there such a feature on ISA?
0
Comment
Question by:jwkl
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 8

Expert Comment

by:Emptyone
ID: 10657429
Make a destination set that list sites you want to block. This is found under Policy Elements
Then you go to Site and Content rules, make a new rule that says deny
Choose deny based on destination
Under Apply this rule to, choose Specified destination set and the choose the destination set you made in the beginning

This blocks access
0
 

Author Comment

by:jwkl
ID: 10663735
Thanks for your comment. That will still require me to create a list of sites but I was thinking if ISA has the feature to filter or block based on keywords found either in the web content or the site name. As you know, it is almost impossible to have the list of all the porn or gambling sites so having the server to block it based on keywords such as lolitas, sex,etc..etc.. would be ideal..
I thought I have read somewhere that it can be done on ISA but can't seem to find that part of the configuration.
0
 
LVL 8

Accepted Solution

by:
Emptyone earned 250 total points
ID: 10664784
To do that I believe you have to install some third party software. But have a look at these pages:

http://www.isatools.org/

http://www.toolzz.com/

They have some script and info that blocks a lot of the pages you want to block

And here you will find some programs that will help you more with content filtering

http://www.isaserver.org/software/ISA/Content_Security/
0
 
LVL 35

Expert Comment

by:Bembi
ID: 10797845
Have a look at
http://www.gfi.com

they have tools for filtering.
0
 
LVL 19

Expert Comment

by:nodisco
ID: 15658468
No comment has been added to this question in more than 21 days, so it is now classified as abandoned..
I will leave the following recommendation for this question in the Cleanup topic area:
Accept - Emptyone

Any objections should be posted here in the next 4 days. After that time, the question will be closed.

nodisco
EE Cleanup Volunteer
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question