[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now


Application blocking or filtering

Posted on 2004-11-24
Medium Priority
Last Modified: 2010-04-08

Does anyone have a recommendation on how to block certain applications, or rather filter outbound protocols in MS ISA 2000? I know that my users are connecting to other services than HTTP and HTTPS through these allowed ports. Is it possible to filter that, or at least block the application through some third party solution for ISA?


Tomas Andersson
Question by:YMNORR
LVL 17

Expert Comment

ID: 12665535
how about using a group policy within the organisation to stop the use of the programs...

Expert Comment

ID: 12669242
Yes you can prevent outgoing protocols.  Make sure you have the protocol defined in the Protocol Definitions in the policy elements node.  Then simply create a Protocol Rule under Access Policy that denies any request using the protocol in question.  You are done!!!

For example, you want to block AOL Instant Messenger traffic from going out.  Here is how to do it.

1) Open the Protocol Rules under Access Policy node
2) Right click and choose Rule...
3) The wizard will ask you to name the rule.  Just give any name and click next.
4) On the rule action window, select deny and click next.
5) On the Protocols window, select "Selected Protocols" and at the bottom make a checkmark on the AOL Instant Messenger and click next
6) On the Schedule window, keep the always selection and click next.
7) On the Client type windows, select Any request and click next.
8) Click finish

Restart the firewall service.  Now all the outgoing AOL messenger traffic is blocked.

Author Comment

ID: 12670577
Well, I'm well familiar with access policies. The suggestion from Microtech is one that I've tried, but it's not the desired solution. I want to make sure that it is HTTP traffic on outgoing port 80 and HTTPS for port 443. Is there a way to do that? The users are very resourceful, they find their way around everything it seems ;-)

LVL 51

Accepted Solution

ahoffmann earned 500 total points
ID: 12673220
you need a Application Level Firewall aka Application Level Gateway aka Web Application Shield aka Application Proxy aka Adaptive Proxy aka ...
(sorry, there are lot of names arround, not my fault:)
Some traditional (network) firewalls support this also (I know of Checkpoint), but the support is limited or unacceptable 'cause of performance.

Are you prepared for $$$$$ (should not be a problem, 'cause you still have M$:-)), then a Application Level Firewall could do the trick. I don't know of any public tool, just some firewalls (as ISA too) have limited built-in facilities.

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Are you ready to place your question in front of subject-matter experts for more timely responses? With the release of Priority Question, Premium Members, Team Accounts and Qualified Experts can now identify the emergent level of their issue, signal…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses
Course of the Month19 days, 16 hours left to enroll

873 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question