How can I block p2p softwares on my network ?

Posted on 2007-10-18
Last Modified: 2013-11-17

My users are using Limewire, different kind of torrents on my network. I want to block them. How can i achieve this.

Please help
Question by:jurjess
    LVL 1

    Expert Comment

    Hello there,

    I recommend using ISA Server from Microsoft. I think it is one of the best softwares to manage your network.

    Take a look here:

    Good luck.
    LVL 69

    Accepted Solution

    in general it would be easier to make the clients limited users and only allow Administrators to run the P2P programs.
    Using Software Restriction Policies to Block Spyware-Adware
     open the run cmd> gpedit.msc,  go Computer Configuration > Windows Settings > Security Settings > Software Restrictions
    You can set it up to disable software from running by a number of different factors.

    You could  use spybot S&D  tea timer

    Setup a firewall and simply block the ports the programs use.  Make sure the firewall is password-protected so they can't get in and open the ports again.  They can install and run the program, but it simply won't connect
    Use ZoneAlarm if you want an all in one solution (Firewall, Antivirus, Antispyware, Parental Filter, ID Blocker (Prevents things like credit card numbers being used over the internet).,

    add the P2P to the hosts file
    block the ports in your cable / dsl router
    Another i have seen here on EE is limit the internet access coud stop them in thier tracks.

    LVL 3

    Expert Comment

    You can try disabling UDP on your firewall. This will disable ping into machines on your network. Do you have a hardware firewall (please say yes)? If you do this should be easy to configure on it. Ping is relied upon by most P2P software.
    LVL 69

    Expert Comment

    Do you still require assistance,
    Your question is still open?
    Is your account still active
    You can now close your own question use the delete link

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Join & Write a Comment

    Today companies are subjected to more-and-more data, and it won't stop any time soon.  But there are obvious opportunities for reducing data, particularly data duplicated among companies.
    In our personal lives, we have well-designed consumer apps to delight us and make even the most complex transactions simple. Many enterprise applications, however, are a bit behind the times. For an enterprise app to be successful in today's tech wo…
    The viewer will learn how to successfully download and install the SARDU utility on Windows 8, without downloading adware.
    XMind Plus helps organize all details/aspects of any project from large to small in an orderly and concise manner. If you are working on a complex project, use this micro tutorial to show you how to make a basic flow chart. The software is free when…

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    24 Experts available now in Live!

    Get 1:1 Help Now