Solved

Block users uploading files via hotmail using Internet Explorer

Posted on 2006-07-20
2
571 Views
Last Modified: 2008-03-17
I am running sbs2003, single NIC without ISA and a Netgear DG834G firewall.

I think that some of the users on my network are logging into their online email yahoo, gmail and hotmail etc. via Internet Explorer and attaching company files to email out because usb is restricted on the computers.  They are not emailing files out via Exchange but via Internet Explorer.

Is there a way to log/check which files have been sent out or is there a way to block users being able to send files out ia internet explorer with the setup i have at the moment?

I know i can block sites using the firewall but is there a firewall port i can block so that i can stop this happenning.

The files are mainly .DOC and .XLS files but i still want to be able to send them out via Exchange email (Outlook)

PLEASE HELP ME!!!
0
Comment
Question by:micromc
2 Comments
 

Author Comment

by:micromc
ID: 17145323
sorry, I just realised that i posted this in the wrong section..
0
 
LVL 19

Accepted Solution

by:
Zaheer Iqbal earned 500 total points
ID: 17145660
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

So you have two Windows Servers and you have a directory/folder/files on one that you'd like to mirror to the other?  You don't really want to deal with DFS or a 3rd party solution like Doubletake. You can use Robocopy from the Windows Server 200…
by Batuhan Cetin In this article I will be guiding through the process of removing a failed DC metadata from Active Directory (hereafter, AD) using the ntdsutil tool in a Windows Server 2003 environment. These steps are not necessary in a Win…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question