Link to home
Start Free TrialLog in
Avatar of Pau Lo
Pau Lo

asked on

ISA Healthcheck

1) What should/would/do external or internal IT auditors or security professionals look at when reviewing the configuration and management of a corporate ISA server? Could you provde some examples of essential things that should be looked at, common mistakes admins make, common issues found through "set it and forget it" type configs...

2) What sort of things would indicate a poorly configured/managed ISA server, please provide some practical examples for a manager/low tech, with subsequent risks....
ASKER CERTIFIED SOLUTION
Avatar of Chris
Chris
Flag of United Kingdom of Great Britain and Northern Ireland image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Common mistakes
User Proxy (outbound)
fairly open rules i.e. Any<>Any style rules meaning any users can get to and from any destinations
use of individuals instead of groups to allow access to rules
combining rules where additional rules should be used, allow access to additional sites.

All these come from initial setup or poor change control, making sure this is all documented with what rules should be on there and standards for creating rules will help avoid these situations

The risk is that users can get to sites that they should be allowed to get to from a corporate stance i.e. facebook, twitter etc
or
they can get to sites that will damage the company or its infrastructure i.e. downloading malware, viruses etc

Risks for outbound rules is that internally services are presented to users that should have access to them i.e. hackers that could gain access to your network.
this is either through incorrectly configured rules or by poor patching which leaves systems with vulnerabilities
Avatar of Pau Lo
Pau Lo

ASKER

Thank you:

>>combining rules where additional rules should be used, allow access to additional sites.
>>use of individuals instead of groups to allow access to rules

Can you elaborate on these a little?
rule 1 - allows Group 1 access to Website list 1

you amend the rule to allow group 1 access to website list 2

someone then asks to have access to website list 1 but doesn't/shouldn't need access to webste list 2

they are just added into rule 1 instead of creating rule 2
which would be - rule 2 allowings group 2 access to website list 1
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial