Solved

How can I use ISA to block specific ports

Posted on 2006-07-10
3
342 Views
Last Modified: 2013-11-16
How can I use ISA to block specific ports that can be used by viruses and other unwanted applications.
0
Comment
Question by:eng_khalid101
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 125 total points
ID: 17077811
Thats a big question..... ISA is not an anti-virus product and doesn't pretend to be. For example, many 'unwanted' applications can use port 80  but it is highlu unlikely that you would want to block this port.

The best you can do is to define a system security policy on paper and then apply that policy with a good anti-virus package such as Sophos or such like. ISA will block all incoming traffic by default whilst allowing all outgoing traffic.

You can amend the default allow all protocols from internal to external by right-clicking the rule and selecting properties. Change the allowed protocols from all outbound to selected protocols and choose the ones you want to allow.

To protect against web applications etc, right click the allow rule and select configure http. Amend the content types etc as needed. (The configure httpis rule-specific so amendments here ONLY affect this one particular rule. If you have other Allow rules, you will need to configure the http/ftp/rpc for these also if you want the same restrictions to apply).)
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question