Solved

Large network, need to proactively protect/monitor malware/virus activity

Posted on 2006-06-19
4
217 Views
Last Modified: 2010-03-18
Hi,

I would like to find out what I could do to set up some traps or monitors at certain points in my network that would alert of me things such as port scans etc...

I would like passive solutions that only become active on detection of banned activity.

Our network doesnt have any such 'tripwire' mechanisms, and im looking for as many suggestions as possible, because the solution will undoubtably borrow from multiple concepts.

Could someone please provide some suggestions to me?

Best regards,

Jamie
0
Comment
Question by:jcourtes
  • 2
4 Comments
 
LVL 42

Expert Comment

by:zephyr_hex (Megan)
ID: 16937542
some routers will have those features (detection of port scans, activity that is virus-like or spyware-like, intrusion detection, etc)
0
 
LVL 14

Expert Comment

by:FriarTuk
ID: 16941212
0
 
LVL 8

Accepted Solution

by:
Here2Help earned 500 total points
ID: 17013632
Hey.

This site maybe useful

http://www.honeynet.org/
0
 
LVL 14

Expert Comment

by:FriarTuk
ID: 17054570
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question