Solved

Control over ICF? Better solution for laptop protection?

Posted on 2004-08-19
1
192 Views
Last Modified: 2010-04-11
I would like to deploy ICF via a GPO in my win 2k3 AD environment. Is there anyway I can control which users get the ICF installed? Also can I control if ICF gets applied on or off, and perhaps which ports are allowed or not. I would like to control it so I can deploy it to certain laptop users, and give ICF a certain configuration. There are lots of users that have laptops that come in and out, and I want them to have protection on foreign networks they connect to, but not get blocked from resources if they dont turn off the firewall when they hit the LAN. Can ICF do what I want? Is there a better managed  solution I should look at?
0
Comment
Question by:cbtech
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 6

Accepted Solution

by:
vtsinc earned 125 total points
ID: 11845775
You might be interested in the article linked-to below:  The article assumes XP SP2, bu some areas may apply to SP1 and XP.

"Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2"
"Windows XP Service Pack 2 provides Windows Firewall, an enhanced firewall that is enabled by default. This white paper describes the methods used to deploy Windows Firewall settings in a managed environment."


http://www.microsoft.com/downloads/details.aspx?FamilyID=4454e0e1-61fa-447a-bdcd-499f73a637d1&DisplayLang=en
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question