Solved

Im curious what others are doing with SP2 and the firewall settings internally ?

Posted on 2004-08-13
10
164 Views
Last Modified: 2013-12-04
We  are moving to XPP on our user desktop and laptops, curious as to what you guys and girls out there are doing internally with the firewall in SP2 ? I have installed it on a few systems so far.Seems to have pros and cons to having it on or off. What are your experiences with that ?
0
Comment
Question by:tmccabe
  • 4
  • 3
  • 2
  • +1
10 Comments
 
LVL 11

Accepted Solution

by:
infotrader earned 20 total points
ID: 11795258
It's working good so far for me.  However, because I use VNC and stuff, I'd need to manually configure some of the settings.  I can see this might cause a lot of problems in a large environement with lots of apps running/sharing between the workstations.

Typically, however, I do not encourage running software firewall in an office environment because it will be an administrative nightmare when you are trying to connect to the local workstations and/or fix problems.

- Info
0
 
LVL 11

Expert Comment

by:infotrader
ID: 11795262
That is, assuming you have an adequet Firewall for your office.

- Info
0
 
LVL 16

Assisted Solution

by:JamesDS
JamesDS earned 20 total points
ID: 11795336
infotrader
I have been using it switched ON with the following allowed:
File and printing
Remote Desktop
Remote Assistance

This has allowed me largely seamless use of the machines as before the SP was installed.

Cheers

JamesDS
0
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

 
LVL 9

Assisted Solution

by:jdeclue
jdeclue earned 20 total points
ID: 11796110
It is great, we are using Group Policy to configure the settings on the Firewall. Even as far as locking the laptops down much tighter when they are not on our network. It is about time. The combination of Group Policy with the firewall is a Great Security tool.

J
0
 
LVL 11

Expert Comment

by:infotrader
ID: 11796161
Don't get me wrong... I am currently using SP2 with the New firewall feature.  It is working good for me so far.

HOWEVER, since I am using VNC and other services, I'd need to tweak the firewall settings to allow those applications to communicate w/ the other computers.

- Info
0
 

Author Comment

by:tmccabe
ID: 11796215
same here with VNC and MS's RDP client stuff we use for Terminal Server. I guess Im leaning towards not having on desktops as opposed to making sure its installed on laptops with port tweaks to allow our remote software to work
0
 
LVL 9

Expert Comment

by:jdeclue
ID: 11796266
I only need the security on the desktops, because of special security requirements (auditors). But, ifthat wasnt a requirement I would still use it on all laptops, at a minimum to try and keep them from leaving, getting the nasties and bringing it back to my network.

J
0
 
LVL 9

Expert Comment

by:jdeclue
ID: 11911878
Could you please give us an update as to the question, and/or close it please. Thank You ;)

J
0
 

Author Comment

by:tmccabe
ID: 11911927
ok !
0
 
LVL 9

Expert Comment

by:jdeclue
ID: 11912056
ThankQ! tmccabe

J
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question