Solved

Using ISA Server 2000 To Block Instant Messaging AIM, MSN, ICQ, YAHOO, ETC...

Posted on 2004-10-12
7
437 Views
Last Modified: 2008-05-29
I want to know how to block Instant Messaging with ISA Server 2000.

I want to know about ISA SERVER 2000 techniques specifically.
I am new to ISA and these are some of the things I need to handle as quickly as possible so I am asking for help.

The top ones I am concerned with are AIM, MSN, YAHOO, ICQ.

Thanks in advance for any help you guys can give
0
Comment
Question by:michaelkirk
  • 3
  • 2
  • 2
7 Comments
 
LVL 2

Expert Comment

by:etracsupport
ID: 12294099
0
 
LVL 1

Author Comment

by:michaelkirk
ID: 12298293
Thanks but I do not think I can use that approach because I do not have the  ISA clients installed I have configured the WPAD file for  autodiscovery.

PLease let me know if this would work without the clients installed or if you have any other ideas.
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 12306575
There are plenty of downloadable filters that can help solve this problem.  The GFI one is good.

http://www.serverfiles.com/Microsoft-server-add-on-software/ISA-server-software/Content-Security/
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 
LVL 2

Accepted Solution

by:
etracsupport earned 500 total points
ID: 12309954
the gfi web filter will only monitor web traffic it will not allow you to block anything.
0
 
LVL 1

Author Comment

by:michaelkirk
ID: 12310355
GFI Download Security will allow me to block files, However I was hoping for a more cost efective (FREE) solution.
I do not know if the rest of you have to deal with a no budget attitude but that is what I am up against constantly.
0
 
LVL 1

Author Comment

by:michaelkirk
ID: 12310363
I am new to this.
Do I accept these responses as they come in or accept the one that works for me which will give that person the points???

Thanks
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 12311841
There's a help button in the top right hand corner which tells you these sorts of things.
Keep the Q open as long as you want.  Once your satisfied with an answer or answers, you can accept them.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

ISA Server detected routes through the network adapter LAN that do not correlate with the network to which this network adapter belongs What does this mean and how can one go about correcting it? In simple terms, this error message indicates t…
In Africa (and potentially where you live…), reliability of ISPs is questionable.  With the increased reliance on e-mail as one of the primary forms of communication, the costs to business are significant based on interuption of ISP Connectivity.  T…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now