Solved

Im curious what others are doing with SP2 and the firewall settings internally ?

Posted on 2004-08-13
10
167 Views
Last Modified: 2013-12-04
We  are moving to XPP on our user desktop and laptops, curious as to what you guys and girls out there are doing internally with the firewall in SP2 ? I have installed it on a few systems so far.Seems to have pros and cons to having it on or off. What are your experiences with that ?
0
Comment
Question by:tmccabe
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 2
  • +1
10 Comments
 
LVL 11

Accepted Solution

by:
infotrader earned 20 total points
ID: 11795258
It's working good so far for me.  However, because I use VNC and stuff, I'd need to manually configure some of the settings.  I can see this might cause a lot of problems in a large environement with lots of apps running/sharing between the workstations.

Typically, however, I do not encourage running software firewall in an office environment because it will be an administrative nightmare when you are trying to connect to the local workstations and/or fix problems.

- Info
0
 
LVL 11

Expert Comment

by:infotrader
ID: 11795262
That is, assuming you have an adequet Firewall for your office.

- Info
0
 
LVL 16

Assisted Solution

by:JamesDS
JamesDS earned 20 total points
ID: 11795336
infotrader
I have been using it switched ON with the following allowed:
File and printing
Remote Desktop
Remote Assistance

This has allowed me largely seamless use of the machines as before the SP was installed.

Cheers

JamesDS
0
The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

 
LVL 9

Assisted Solution

by:jdeclue
jdeclue earned 20 total points
ID: 11796110
It is great, we are using Group Policy to configure the settings on the Firewall. Even as far as locking the laptops down much tighter when they are not on our network. It is about time. The combination of Group Policy with the firewall is a Great Security tool.

J
0
 
LVL 11

Expert Comment

by:infotrader
ID: 11796161
Don't get me wrong... I am currently using SP2 with the New firewall feature.  It is working good for me so far.

HOWEVER, since I am using VNC and other services, I'd need to tweak the firewall settings to allow those applications to communicate w/ the other computers.

- Info
0
 

Author Comment

by:tmccabe
ID: 11796215
same here with VNC and MS's RDP client stuff we use for Terminal Server. I guess Im leaning towards not having on desktops as opposed to making sure its installed on laptops with port tweaks to allow our remote software to work
0
 
LVL 9

Expert Comment

by:jdeclue
ID: 11796266
I only need the security on the desktops, because of special security requirements (auditors). But, ifthat wasnt a requirement I would still use it on all laptops, at a minimum to try and keep them from leaving, getting the nasties and bringing it back to my network.

J
0
 
LVL 9

Expert Comment

by:jdeclue
ID: 11911878
Could you please give us an update as to the question, and/or close it please. Thank You ;)

J
0
 

Author Comment

by:tmccabe
ID: 11911927
ok !
0
 
LVL 9

Expert Comment

by:jdeclue
ID: 11912056
ThankQ! tmccabe

J
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
Suggested Courses

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question