Solved

ISA 2004 access policy - URL Blocking

Posted on 2006-07-06
4
242 Views
Last Modified: 2010-04-09
I want to block all internet sites except these three.  I do have some people who will need full access.

www.dor.mo.gov   
www.google.com
www.CarFax.com
0
Comment
Question by:redvipergts
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17056415
Going to need a lot more info:

What network template have you used to set up the ISA?
Have you installed the ISA client, SecureNAT or just web proxy?
Is the ISA connected to the domain?
Are you wanting to block by user name or IP?
If you are blocking all internet access except for those three web sites, how is dns, smtp etc going out to the internet?
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17079334
Any update?
0
 
LVL 1

Author Comment

by:redvipergts
ID: 17093055
Keith, the network template is edge firewall, I installed the firewall client, the plug-in that sits in the systray, the isa server is not connected to the domain so I guess we would he to block by IP ?

All I know is that the owner wants all employees to only go to three sites, but a few will still be wide open.

Any ideas ?
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 250 total points
ID: 17125447
Yes, by IP is your only option then.

You will need to create computer objects with the ip addresses of the users you want to allow.
You will need to create a url set with the three web sites you want to allow.

You will need two rules in this order.
One will be the allow all rule with the from being the computer objects you have created.
One will be the allow rule with the url set including the three allowed sites for all users.
0

Featured Post

Resolve Critical IT Incidents Fast

If your data, services or processes become compromised, your organization can suffer damage in just minutes and how fast you communicate during a major IT incident is everything. Learn how to immediately identify incidents & best practices to resolve them quickly and effectively.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question