Solved

restricting types of files/data that could be uploaded to Windows & UNIX servers

Posted on 2016-09-13
5
79 Views
Last Modified: 2016-09-15
Just like in gmail (& my Outlook) we can't attach an executable file, is there anyway
that we can scan & block if files uploaded (by Rdp copy & paste) is say an executable
& only allow text files?

I suppose in UNIX servers sftp/scp, it's encrypted, we can't check as it's encrypted,
so is there any way to go around this?

This is to prevent certain types of files from being uploaded from PCs to servers
0
Comment
Question by:sunhux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 54

Expert Comment

by:McKnife
ID: 41795839
No, not possible using windows' own mechanisms.
Why would you want that? Instead, I recommend to block the execution of unknown code using Applocker.
0
 
LVL 12

Accepted Solution

by:
Sandeep earned 250 total points
ID: 41795884
For Windows you got option to use File Screening where you can set your rules which files to allow and which not.

Please refer to https://technet.microsoft.com/en-us/library/cc732074(v=ws.11).aspx
0
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 250 total points
ID: 41795946
@reach2sandeep - true. I kind of read the requirement wrong. On servers (and their shares) you can solve it, just not on clients. But will it work with rdp copy and paste to non-shared folders?
0
 
LVL 12

Expert Comment

by:Sandeep
ID: 41799607
Yes it should, as when you paste the data on Server and that server got screening enabled for that path restriction should get applied if I am not wrong...
0
 
LVL 54

Expert Comment

by:McKnife
ID: 41799876
"if I am not wrong..." - I believe you are because it will only apply to shares.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Learn how to PXE Boot both BIOS & UEFI machines with DHCP Policies and Custom Vendor Classes
A project that enables an administrator to perform actions within a user session context not just at the time of login but any time later on day(s) or week(s) later.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question