Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Control over ICF? Better solution for laptop protection?

Posted on 2004-08-19
1
Medium Priority
?
194 Views
Last Modified: 2010-04-11
I would like to deploy ICF via a GPO in my win 2k3 AD environment. Is there anyway I can control which users get the ICF installed? Also can I control if ICF gets applied on or off, and perhaps which ports are allowed or not. I would like to control it so I can deploy it to certain laptop users, and give ICF a certain configuration. There are lots of users that have laptops that come in and out, and I want them to have protection on foreign networks they connect to, but not get blocked from resources if they dont turn off the firewall when they hit the LAN. Can ICF do what I want? Is there a better managed  solution I should look at?
0
Comment
Question by:cbtech
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 6

Accepted Solution

by:
vtsinc earned 500 total points
ID: 11845775
You might be interested in the article linked-to below:  The article assumes XP SP2, bu some areas may apply to SP1 and XP.

"Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2"
"Windows XP Service Pack 2 provides Windows Firewall, an enhanced firewall that is enabled by default. This white paper describes the methods used to deploy Windows Firewall settings in a managed environment."


http://www.microsoft.com/downloads/details.aspx?FamilyID=4454e0e1-61fa-447a-bdcd-499f73a637d1&DisplayLang=en
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
How does someone stay on the right and legal side of the hacking world?
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

660 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question