Step-by-Step Guide

Step 1: Blocking peer-to-peer applications

Now that I have discussed the dangers of peer-to-peer applications, I want to shift the focus of my discussion to blocking these types of applications. Unfortunately, I can't give you specific instructions. There are dozens of different peer-to-peer applications, and each one acts a little differently. The other reason why I can't give you specific instructions is because every network is set up differently. What I can tell you is that your best defense against peer-to-peer applications is to exercise defense in depth. This means that you shouldn't depend on one single mechanism to block peer-to-peer applications; instead, use a combination of defense mechanisms.

It may sound strange to think that you would need an entire arsenal of security mechanisms just to block an application, but file-sharing programs are no ordinary applications. Many of them are specifically designed to circumvent the usual security defenses.


Blocking peer-to-peer applications

 Home: Introduction
 Step 1: Blocking peer-to-peer applications
 Step 2: Firewalls
 Step 3: Application-level filters
 Step 4: Software restriction with Group Policy

ABOUT THE AUTHOR:
Brien M. Posey, MCSE, is a Microsoft Most Valuable Professional for his work with Windows 2000 Server and IIS. He has served as CIO for a nationwide chain of hospitals and was once in charge of IT security for Fort Knox. As a freelance technical writer, he has written for Microsoft, TechTarget, CNET, ZDNet, MSD2D, Relevant Technologies and other technology companies. You can visit his personal Web site at www.brienposey.com.
Copyright 2005 TechTarget

This was first published in July 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: