Solved

Control over ICF? Better solution for laptop protection?

Posted on 2004-08-19
1
189 Views
Last Modified: 2010-04-11
I would like to deploy ICF via a GPO in my win 2k3 AD environment. Is there anyway I can control which users get the ICF installed? Also can I control if ICF gets applied on or off, and perhaps which ports are allowed or not. I would like to control it so I can deploy it to certain laptop users, and give ICF a certain configuration. There are lots of users that have laptops that come in and out, and I want them to have protection on foreign networks they connect to, but not get blocked from resources if they dont turn off the firewall when they hit the LAN. Can ICF do what I want? Is there a better managed  solution I should look at?
0
Comment
Question by:cbtech
1 Comment
 
LVL 6

Accepted Solution

by:
vtsinc earned 125 total points
ID: 11845775
You might be interested in the article linked-to below:  The article assumes XP SP2, bu some areas may apply to SP1 and XP.

"Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2"
"Windows XP Service Pack 2 provides Windows Firewall, an enhanced firewall that is enabled by default. This white paper describes the methods used to deploy Windows Firewall settings in a managed environment."


http://www.microsoft.com/downloads/details.aspx?FamilyID=4454e0e1-61fa-447a-bdcd-499f73a637d1&DisplayLang=en
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Using Outlook for iOS securely 2 44
Office 365 setting for security 4 79
How to restore security permissions on a file server 4 54
Connecting a New Subnet to Network 4 29
Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
With healthcare moving into the digital age with things like Healthcare.gov, the digitization of patient records and video conferencing with patients, data has a much greater chance of being exposed than ever before.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question