how to accommodate new Lab-tops in corporate network

i got lot of consultant, vendors, franchisees connecting to my network for internet and other work.

how i can control the access and make sure and enforce some white listing of software.

i do not want them to use SNIFFING, SCANNING and other illegal tools.

1) is there any STANDARD for it?
2) what tools are the best tools
Who is Participating?
Rich WeisslerProfessional Troublemaker^h^h^h^h^hshooterCommented:
For the software side of things, I'm not certain how you'd build a white list necessarily... and hope to keep out all inappropriate software on laptops, at least not without some form of IPS/IDS in place.

For the compliance with security policies, I'd just build on what 'the_endjinn' said, and add that it sounds all the world like you are asking for a Network Policy Server.  (But scanning/sniffing, etc... you'll likely need an IDS to spot the traffic, since I'm not sure you can build a list of every possible scanner/sniffer.)
I'm afraid this is a very large topic and the answer will depend very much on what your infrastructure is like. Please provide some more details giving a bit of an environment overview and I'm sure we can help.

Basically it sounds like you are after a combination of NAC (Network Access Control) and IPS (Intrusion Prevention System, or IDS where the D stands for detection).

NAC determines whether a device can connect to your network based upon rules, such as compliance with security policies or having up to date anti-virus. IPS/IDS will sit in your environment and detect or act upon network activity which you determine to be against the policies you have defined, such as port scanning or exploitation of certain vulnerabilities.
osloboyAuthor Commented:
no no

IPS/IDS, firewall is out of question. we are controlling DHCP leasing and stuff.

Q: how to enforce your software white list on a visitor labtop.

is there any STANDARD related to endures, etc  
Improve Your Query Performance Tuning

In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!

osloboyAuthor Commented:
which IT standard or part of IT standard deal exactly with this kind of criteria's
Rich WeisslerProfessional Troublemaker^h^h^h^h^hshooterCommented:
In ITIL standards, I suppose this would be touched in Service Access and Configuration Management under Service Transition, and in Service Design.

I'm not certain where it would be in the MOF 4.0 framework.
osloboyAuthor Commented:
thanks guys, great help for NAC.

on standard side i think ISO 27002 is great thing part A.11. chees
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.