Solved

Some questions about ISA firewall policies

Posted on 2007-11-23
6
244 Views
Last Modified: 2008-11-17
Hello
I'm newcomer of ISA server 2006 So here you are my questions!
1- ) I notice that when i create access rule on ISA i found "Instant Messaging" when i open i find Msn,Icq,...etc But i didnt see  other instant message like  Yahoo Messnger or Google talk ... so how can i Create access rule to deny these isntant messaging ?

2- ) is there is any problem if i join ISA Server to Domain controller After installing ISA server 2006 on the box OR it should be joind already to domain controller before installing ISA server 2006?

0
Comment
Question by:ali_alannah
6 Comments
 
LVL 19

Accepted Solution

by:
Stephen Manderson earned 168 total points
ID: 20338391
Hi there,

Please take a look at the following tutorial on how to block these messenger applications from running through ISA.
http://www.isaserver.org/tutorials/How_to_Block_Dangerous_Instant_Messengers_Using_ISA_Server.html

With regards to ISA I would do the join to the domain before the install personally.

Regards
Steve
0
 
LVL 19

Expert Comment

by:SteveH_UK
ID: 20339431
I agree with MrManderson that you should join first.

Note that many of these IM clients are hard to block because they appear like normal web traffic.  ISA itself doesn't provide a particularly helpful solution to this problem, and is not fully solved by the suggestions in the linked document.  All the user has to do is rename the executable in general.

Instead, I recommend that you consider whether you need an application protocol filter.  These are rather expensive, but are designed to block some of these kinds of software, and are automatically updated on a regular basis.
0
 
LVL 19

Assisted Solution

by:SteveH_UK
SteveH_UK earned 166 total points
ID: 20339446
See http://www.barracudanetworks.com/ns/products/web-filter-overview.php for the Barracuda solution, but many others exist.  All expensive, though :(
0
 
LVL 51

Assisted Solution

by:Keith Alabaster
Keith Alabaster earned 166 total points
ID: 20339832
In respect to the IM's, yes there are only one or two named specifically and this is because these had options to use ports other than the traditional port 80 to pass their traffic across. In reality, almost all IM style utilities use port 80. If you want to block those then you need to create the controls yourself. Most applications use agents or 'signatures' to identify the type of traffic they represent and the type of service they are connecting to. This link shows a number of the common 'User Agents' in use.

http://www.microsoft.com/technet/isa/2004/plan/commonapplicationsignatures.mspx

Use the http filters on each rule to control the user-agents you want to block/allow. Remember the http filter is applied to that rule only. ie Change the http filter on rule 1 but that changer does not apply to rule 2, rule 3 etc - it only applies to the rule that the filter is changed on.



In respect to the connection, it does not matter either way on the order. The only real difference is if you are going to be using rule authentication through Active Directory or such like. You cannot 'prepare' the system in advance as the ISA would not have the ability to see the AD. Many providers prepare the ISA server systems before they ship them to customers. Bottom line - it is up to you.

Keith
ISA MVP
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20703235
Forced accept.

Computer101
EE Admin
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Forefront is the brand name for Microsoft's major security product. Forefront covers a number of specific security areas and has 'swallowed' a number of applications under this umbrella including Antigen, ISA Server, the Integrated Access Gateway (t…
In Africa (and potentially where you live…), reliability of ISPs is questionable.  With the increased reliance on e-mail as one of the primary forms of communication, the costs to business are significant based on interuption of ISP Connectivity.  T…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now