Solved

Question re need for enabling Intrusion Prevention System on an Astaro Firewall

Posted on 2007-03-22
2
326 Views
Last Modified: 2013-11-29
Hi - I run my home network including an Exchange Server that handles our email and outlook mobile access, behind an Astaro firewall. The only incoming ports are 25 and 443 that go to the Small Business Server.

Do I need to enable Astaro's intrusion prevention system?
Is it worth the hassle / overhead?
Will it really make much difference given I rely on Window IIS authentication using strong passwords?
I have a fully up to date and patched system.
I don't have firewall restrictions on outbound access ... we have 'clean' systems here.
Would IPD/IPS help in any way if I did get malware inside my network?
Any thoughts appreciated!
0
Comment
Question by:MPSmith4258
2 Comments
 
LVL 2

Accepted Solution

by:
flscott earned 250 total points
ID: 18780029
Do I need to enable Astaro's intrusion prevention system?
You probably dont need to in order for the firewall to function, but I would.

Is it worth the hassle / overhead?
Intrusion Prevention is usually worth the hassle. There shouldn't be much overhead after the initial setup and configuration. Yes. In the event of your systems being compromised

Will it really make much difference given I rely on Window IIS authentication using strong passwords?
Strong authentication using passwords is only a single piece of a highly secure network.

I have a fully up to date and patched system.
Many times, vulerabilities are exploited BEFORE official patches are released. It is not wise to soley rely on the software vendor for patches.

I don't have firewall restrictions on outbound access ... we have 'clean' systems here.
It is not safe to assume your systems are clean. While they may well be clean at this time, there are many events that could occur that would change that fact.


Would IPD/IPS help in any way if I did get malware inside my network?
Yes. Intrusion protection can monitor outbound accesses and also monitor packets going out of your network. Many times you can save yourself a lot of hassle by just looking up suspicious port number traffic.
0
 

Author Comment

by:MPSmith4258
ID: 18780172
Thanks so much for your answer ... I've turned it on!
0

Featured Post

Register Today - IoT Current and Future Threats

Are you prepared to protect your organization from current and future IoT Threats?  Join our Wi-Fi expert in episode three of our webinar series for a look at the current state of Wi-Fi IoT and what may lie ahead. Register for our live webinar on April 20th at 9 am PDT!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
google exe file 5 145
Public Printing Options 3 68
Top honey pots & reviews of canary 7 53
Your Connection is Not Private When Accessing Gmail 4 59
Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?
Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question