Solved

What is the best way to monitor, protect and stop P2P software on a corporate network.

Posted on 2008-06-12
6
243 Views
Last Modified: 2010-04-10
What is the best way to monitor, protect and stop P2P software on a corporate network.
0
Comment
Question by:IT-DKB
  • 5
6 Comments
 
LVL 58

Expert Comment

by:tigermatt
Comment Utility
There's several ways to do it. In most cases, you would want to ensure your firewall is configured not to allow any of the peer-to-peer protocols through to the Internet. The firewall is the best and easiest location to enforce these sorts of changes.

Also, if the P2P software requires installation, the other possibility is of course to just take away users' elevated rights to their workstations. This will stop them installing software in the first place, meaning you would eliminate most of the P2P software with immediate effect. Users shouldn't have local Administrator rights on workstations anyway.

-tigermatt
0
 
LVL 58

Expert Comment

by:tigermatt
Comment Utility
There's some articles below I've found; they look good and I suggest you have a read!

http://www.websense.com/docs/WhitePapers/PeertoPeer.pdf
http://www.juniper.net/solutions/literature/solutionbriefs/351036.pdf

-tigermatt
0
 

Author Comment

by:IT-DKB
Comment Utility
I'm using a PIX 515e. Is there any information on how to block through the Cisco Firewall?
0
Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 58

Accepted Solution

by:
tigermatt earned 500 total points
Comment Utility
Here you go, specifically for the PIX 500 series! http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00801e419a.shtml

-tigermatt
0
 
LVL 58

Expert Comment

by:tigermatt
Comment Utility
Hi, thanks for the points. I just wondered why you awarded a 'B' grade?
0
 
LVL 58

Expert Comment

by:tigermatt
Comment Utility
No response? <sigh>
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now