Solved

How to block Uploading Through ISA Server 2004

Posted on 2012-12-30
4
1,392 Views
Last Modified: 2013-02-03
Dear All,

Good day,

In Our Org. We are using ISA 2004, need to Block the Upload using ISA 2004, Upload in youtube, twitter, google, yahoo, hotmail.......

Please guide me how can i do it

Waiting for your commends

Thanks
Kumar
0
Comment
Question by:Ram Kumar Chellam
  • 2
4 Comments
 
LVL 3

Accepted Solution

by:
Teeshirt earned 167 total points
ID: 38730709
0
 
LVL 6

Assisted Solution

by:infoplateform
infoplateform earned 333 total points
ID: 38797897
0
 
LVL 6

Assisted Solution

by:infoplateform
infoplateform earned 333 total points
ID: 38797900
you can also done following steps

      
How to Block HTTP-Uploads through ISA 2006
by  Fiorani, PaoloNo presence information  on 15/07/2009 0.12
Category: ISA
In case you want to block HTTP files upload (only HTML forms, not WebDAV) this is the way:
 

    Locate the rule that alllow HTTP browsing
    Right click it -> Configure HTTP
    Select Signature tab and create a new signaure:
        Name: Block HTTP Upload
        Search in: Request headers
        HTTP header: Content-Type:
        Signature: multi
0
 

Author Closing Comment

by:Ram Kumar Chellam
ID: 38848804
Thanks
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Forefront is the brand name for Microsoft's major security product. Forefront covers a number of specific security areas and has 'swallowed' a number of applications under this umbrella including Antigen, ISA Server, the Integrated Access Gateway (t…
There are several problems reported according slow link speeds or poor performance in TMG 2010, UAG 2010 or ISA 2006. I want to collect here some of the common issues together to give a brief overview what can be the reason. Nevertheless, not all of…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question