[Last Call] Learn how to a build a cloud-first strategyRegister Now


Monitoring - Deep Analysis Firewall - Desktop Level

Posted on 2006-03-24
Medium Priority
Last Modified: 2013-12-04

Hello there, I have a simple setup, one machine and also one other machine, although they are on the same network only a file server and web server is used, nothing else is shared. I would like to know the most in depth way to monitor and filter traffic based upon what leaves and comes in on a desktop machine.

In other words, the best firewall (software) or any other application like IDS that can be used on a desktop machine not a server, which provides the best in depth analysis and protection for a simple normal desktop user.
Question by:zalance
LVL 17

Accepted Solution

Dushan De Silva earned 136 total points
ID: 16289322
Try with sygate firewall

BR Dushan
LVL 51

Assisted Solution

by:Keith Alabaster
Keith Alabaster earned 132 total points
ID: 16294393
Integrity or zonealarm are reasonable products just for a desktop. They are simple, cost-effective and easy to configure. Of course, if its a MS PC, then the firewall that comes with XP SP2 is also perfectly acceptable for most scenario's.
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 132 total points
ID: 16325975
ZoneAlarm also get my vote. If you want to see what's comming in an out, you can look at programs like NTOP http://www.openxtra.co.uk/products/ntop-xtra.php
You will get graphs and stats on certain kinds of traffic, SMTP, HTTP, UDP etc..
An IDS system such as Snort can also tell you if it recognizes certain types of traffic based on signatures for exploits and other known "undesirable" traffic, such as having a P2P program installed, or your machine is connecting to IRC...

Featured Post

Vote for the Most Valuable Expert

It’s time to recognize experts that go above and beyond with helpful solutions and engagement on site. Choose from the top experts in the Hall of Fame or on the right rail of your favorite topic page. Look for the blue “Nominate” button on their profile to vote.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
OfficeMate Freezes on login or does not load after login credentials are input.
This Micro Tutorial will teach you how to add a cinematic look to any film or video out there. There are very few simple steps that you will follow to do so. This will be demonstrated using Adobe Premiere Pro CS6.
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
Suggested Courses

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question