Solved

Anti-Virus Protection Needed?

Posted on 2007-04-03
7
509 Views
Last Modified: 2013-11-22
Wanted other opinions on Virus Protection.  We have several sattelite offices set up as workgroups. The pc's are running Windows XP Professional.   Each office has a Sonic Wall firewall with Anti-virus, Anti-Spyware and Intrusion Prevention programs configured on each Sonic Wall unit.
Do you think it is necessary to have individual pc antivirus/antispyware protection as well?  I know that a person can still bring in a virus on a file they might upload from a floppy or jump drive BUT the majority of our users upload/download files from their mail.

So, do you think individual pc protection is overkill?
0
Comment
Question by:liguru
  • 3
  • 2
  • 2
7 Comments
 
LVL 32

Accepted Solution

by:
r-k earned 50 total points
Comment Utility
A lot depends on your users. If these are computer-savvy users then meybe not. But if these are average users then yes, I would err on the side of caution and suggest AV on each desktop.

At the same time, you have to make sure the defs are updated automatically, and the AV does not interfere with anything else more important.

Also install Windows Defender on each PC.
0
 
LVL 3

Author Comment

by:liguru
Comment Utility
I too tend to err on the side of caution, however, we paid alot of money for the sonic wall protection and the owner of the company wanted to save some money.

My recommendation was to keep the AV on the individual pc's but thought I'd get other opinions.

Thanks for your comment!
0
 
LVL 32

Expert Comment

by:r-k
Comment Utility
I suppose you can recommend it but let the owner decide. At least they would be aware of the options.

Windows Defender is free, but is not traditional AV.

To be fair, lately the incidence of traditional viruses has been greatly in decline here, esp. since I started blocking all executable files at the mail server. It has been many months since I got a warning about an infected attachment from my AV program.

Good luck.
0
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

 
LVL 27

Expert Comment

by:Tolomir
Comment Utility
Indeed, block executables on the firewall and there are a lot of user introduced problems solved.

Of cause all users need to be restricted users.

Create a home folder for each user on a network share and let at least run some antivirus solution on that server.

Tolomir

0
 
LVL 3

Author Comment

by:liguru
Comment Utility
Unfortunately, each office is a workgroup with NO server.  I have tried to make most users limited users through XP but there are some programs certain users use that just do not run properly as a limited user.

For now I have blocked .exe files, installed Windows Defender for an extra anti-spyware solution and have crossed my fingers!
0
 
LVL 32

Expert Comment

by:r-k
Comment Utility
"I have blocked .exe files"

That's a good start, but here is the list of file types I am currently blocking:

.vbs  .pif  .exe  .bat  .scr  .vbe  .hta   .asp  .zip   .htt  .mim  .hqx   .uue

I may have missed a few, but the above should catch 99% of infected files.

Good luck.
0
 
LVL 27

Expert Comment

by:Tolomir
Comment Utility
how about

.com   .cmd   .bin  .rar    .iso

not that uncommon...
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now