Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


How to block Limewire via ISA Server

Posted on 2010-01-11
Medium Priority
Last Modified: 2012-05-08
Dear all experts,

i would like to know how to block Limewire by using ISA Server.
your solution is appreciation.

Question by:oohoo_u
LVL 51

Accepted Solution

Keith Alabaster earned 1000 total points
ID: 26307559
number of ways but as you have not mentioned it, I'll assume you are using a supported version of ISA such as ISA2004 or ISA2006 with the latest service pack applied.

1. you can create computer entries for the servers that cover www.limewire.com
Non-authoritative answer:
Name:    www.limewire.com

then add a deny access rule all protocols from internal - to the computer objects and place it above the allow access rules.

2. Create a url set for www.limewire.com. Create a deny http & https access rule from internal to the limewire url set and place the rule above the allow access rules.

3. Create a domain set for limewire.com AND *.limewire.com. Create a deny access rule - all protocols - from internal to limewire domain set.
Place the rule above the allow access rules.

4. Identify through the realtime log what the agent signature name is that limewire uses and then add the signature to the content filters.

This is extremely basic ISA knowledge - you may want to consider getting some training on the product before you try and do this sort of thing prefessionally.

keith - ISA Forefront MVP

Assisted Solution

by:Mohamed Khairy
Mohamed Khairy earned 1000 total points
ID: 32669424
Keith explained all the available solutions, and I will help on step 4 by explaining how to do it because you can use application signatures with ISA Server HTTP filtering to block specific applications and it will works successfully. firstly you need to read carefuly the below technical guide from Microsoft to know which signature you need to block


Then you can review the below link to have a stepm by step configuring the mentioned filtering:


Hope these will help you.



Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

572 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question