Solved

completely block TeamViewer For FortiGate

Posted on 2016-09-25
5
50 Views
Last Modified: 2016-10-15
Hi.....
I need to completely block team access from outside to internal clients. I need to make sure in my network that no on uses team viewer in my network

i have Fortigate 300D
0
Comment
Question by:Rami Mansour
5 Comments
 
LVL 76

Assisted Solution

by:arnold
arnold earned 100 total points (awarded by participants)
ID: 41815455
Identify their IP range, and block outgoing traffic to that destination.

Adding the destination with a log event....

A simpler option in an AD environment, setup a software restriction GPO blocking the running of teamviewr.exe.
Note it will not prevent a determined individual from adjusting the application name, runn.........
0
 
LVL 68

Assisted Solution

by:Qlemo
Qlemo earned 100 total points (awarded by participants)
ID: 41815516
Blocking all IPs is hard to do, there are a lot of TeamViewer servers ...
Blocking the EXE itself is more promising, though easy to circumvent.
Anything else requires to analyze the traffic - very difficult, in particular with SSL.
0
 
LVL 23

Assisted Solution

by:Dr. Klahn
Dr. Klahn earned 100 total points (awarded by participants)
ID: 41815517
This page has a detailed explanation of one user's approach, which also short-circuits TeamViewer's fallback strategy of tunneling using port 80.

https://mediarealm.com.au/articles/2014/10/block-teamviewer-network/

However, as Qlemo points out above, if the application now tries to circumvent DNS blocking by using servers outside the teamviewer.com domain, it will probably be necessary to block the executable and hope none of your users are smart enough to rename it.
0
 
LVL 9

Accepted Solution

by:
Muhammad Mulla earned 200 total points (awarded by participants)
ID: 41816318
Under Application Control on your Fortigate, you will find 3 different signatures for TeamViewer in the Remote.Access category.

Block all of them under application overrides.
0
 
LVL 23

Expert Comment

by:Dr. Klahn
ID: 41844848
EE email requested stale question closure.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

This article describes how to set permissions to allow a limited-permissions user to start and stop a particular System Service.   It is always best to give users only the permissions that they need to perform their job, so tweaking particular permi…
This is a little timesaver I have been using for setting up Microsoft Small Business Server (SBS) in the simplest possible way. It may not be appropriate for every customer. However, when you get a situation where the person who owns the server is i…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now