Solved

SBS 2011 Block Ports On Workstation

Posted on 2013-06-01
5
790 Views
Last Modified: 2013-06-06
Recently my network got hit by a spamming virus/malware. I need to block email ports on all the workstations. I read other forums that suggest I use IPSec via GPO to block specific ports on the workstations, but none of them are very detailed.

I open the Group Policy Management, but not sure where to go from there to create a new GPO?
0
Comment
Question by:datzent83
  • 3
  • 2
5 Comments
 
LVL 57

Expert Comment

by:Cliff Galiher
ID: 39213185
Unfortunately in the case of malware, it often can and does disable firewall rules. So using software or group policies is insufficient. You must block it at the network edge with appropriate UTM/firewall rules.
0
 

Author Comment

by:datzent83
ID: 39213225
Can you please give me the steps on how I can block it at the network edge with appropriate UTM/firewall rules.
0
 
LVL 57

Expert Comment

by:Cliff Galiher
ID: 39213279
Each UTM is different. Configuring a SonicWall is very different than configuring a Cisco which is again VERY different than Watchguard. So no, no easy way to give you a step by step.
0
 

Author Comment

by:datzent83
ID: 39213345
I don't have a hardware firewall. My SBS is my DHCP. I need to make sure that port 25 passes only through the SBS server.
0
 
LVL 57

Accepted Solution

by:
Cliff Galiher earned 500 total points
ID: 39213379
There is no way to enforce that. SBS is not a gateway/edge device. And that is where such rules are enforced. Even small businesses should have a UTM at their edge. The companies I listed above all make small business devices and price them accordingly.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question