Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How can I use ISA to block specific ports

Posted on 2006-07-10
3
Medium Priority
?
343 Views
Last Modified: 2013-11-16
How can I use ISA to block specific ports that can be used by viruses and other unwanted applications.
0
Comment
Question by:eng_khalid101
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 17077811
Thats a big question..... ISA is not an anti-virus product and doesn't pretend to be. For example, many 'unwanted' applications can use port 80  but it is highlu unlikely that you would want to block this port.

The best you can do is to define a system security policy on paper and then apply that policy with a good anti-virus package such as Sophos or such like. ISA will block all incoming traffic by default whilst allowing all outgoing traffic.

You can amend the default allow all protocols from internal to external by right-clicking the rule and selecting properties. Change the allowed protocols from all outbound to selected protocols and choose the ones you want to allow.

To protect against web applications etc, right click the allow rule and select configure http. Amend the content types etc as needed. (The configure httpis rule-specific so amendments here ONLY affect this one particular rule. If you have other Allow rules, you will need to configure the http/ftp/rpc for these also if you want the same restrictions to apply).)
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question