Solved

Large network, need to proactively protect/monitor malware/virus activity

Posted on 2006-06-19
4
215 Views
Last Modified: 2010-03-18
Hi,

I would like to find out what I could do to set up some traps or monitors at certain points in my network that would alert of me things such as port scans etc...

I would like passive solutions that only become active on detection of banned activity.

Our network doesnt have any such 'tripwire' mechanisms, and im looking for as many suggestions as possible, because the solution will undoubtably borrow from multiple concepts.

Could someone please provide some suggestions to me?

Best regards,

Jamie
0
Comment
Question by:jcourtes
  • 2
4 Comments
 
LVL 42

Expert Comment

by:zephyr_hex
Comment Utility
some routers will have those features (detection of port scans, activity that is virus-like or spyware-like, intrusion detection, etc)
0
 
LVL 14

Expert Comment

by:FriarTuk
Comment Utility
0
 
LVL 8

Accepted Solution

by:
Here2Help earned 500 total points
Comment Utility
Hey.

This site maybe useful

http://www.honeynet.org/
0
 
LVL 14

Expert Comment

by:FriarTuk
Comment Utility
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

A brief overview to explain gateways, default gateways and static routes OR NO - you CANNOT have two default gateways on the same server, PC or other Windows-based network device. In simple terms a gateway is formed when a computer such as a serv…
Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now