Solved

how to block the .mp3 and .exe in ISA server 2004  and also access issue in VPN client

Posted on 2006-11-15
3
1,310 Views
Last Modified: 2013-12-04
Hi,

I am using the ISA server 2003 for proxy and firewall,  plz suggest how i can crete the rules to block the .exe and .mp3 form my ISA server 2004.
 Secondly i want to create the  rules to access the my office local machine from my home using VPN , I try to configure it and also able to login but not able to access my office local machine from my home

Regards,
Naresh


0
Comment
Question by:nareshver
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 14

Accepted Solution

by:
inbarasan earned 500 total points
ID: 17945380
Dear nareshver,

You can make use of HTTP filter.

Right mouse click on the rule that allows HTTP access in the Firewall Rules section of ISA management, then choose the "Configure HTTP".

Under the tab "Extensions" you can manage it.


Cheers!
0
 

Author Comment

by:nareshver
ID: 17955684
i have add the .exe and .mp3 but still isa does not block these file.

Thanks
Naresh

0
 
LVL 1

Expert Comment

by:houtanal
ID: 18012199
You can Create New Access Rule and block protocol,content-type and ... in it.
this article could be helpful.
http://support.microsoft.com/kb/925120
0

Featured Post

Webinar: Aligning, Automating, Winning

Join Dan Russo, Senior Manager of Operations Intelligence, for an in-depth discussion on how Dealertrack, leading provider of integrated digital solutions for the automotive industry, transformed their DevOps processes to increase collaboration and move with greater velocity.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
should I worry about this? 6 107
Changing the domain admin password 9 108
How can i protect my data from ransomware 12 97
semaphore timeout period has expired 1 26
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question