Solved

Whats the best way to block access to specific sites?

Posted on 2010-08-25
1
335 Views
Last Modified: 2016-09-30
I work in an environment where we have public access to our information.  This information can be viewed and researched any time for free.  However paper and digital copies of the information to be taken away must be paid for.  Recently the honor system seems to have fallen down as some researchers have been emailing themselves gigabytes of data from our research computers.

Time to restrict access.

Points to note:  I don't control the DNS; the OU that these computers reside in is the ONLY one that should be restricted; there are legitimate reasons to be accessing the internet from our research computers, so we just want to block access to web mail; the solution needs to work for both IE and Firefox, on a mixture of Vista and Win 7 computers.

So far in my research, the hosts file seems to be the 'best' solution, but it's clunky, inflexible and wont accept wild cards.
0
Comment
Question by:Williams Co IT Dept
1 Comment
 

Accepted Solution

by:
Williams Co IT Dept earned 0 total points
ID: 33533528
OK IPSec seems to have resolved the issue!!

A Group Policy Object able to be applied to a single OU, using existing infrastructure, blocking all secure connections on port 443.  This will block some possibly legitimate uses of the internet on those machines, but they will be few and there are other options for the public if they need that.

GPO
Computer Configuration>
Policies>
Windows Settings>
Security Settings>
IP Security Policies>
Created a new IP Security Policy, followed Wizard and added rules for LAN connections that connect through TCP and UDP to port 443.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question