Now that I have discussed the dangers of peer-to-peer applications, I want to shift the focus of my discussion...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
to blocking these types of applications. Unfortunately, I can't give you specific instructions. There are dozens of different peer-to-peer applications, and each one acts a little differently. The other reason why I can't give you specific instructions is because every network is set up differently. What I can tell you is that your best defense against peer-to-peer applications is to exercise defense in depth. This means that you shouldn't depend on one single mechanism to block peer-to-peer applications; instead, use a combination of defense mechanisms.
It may sound strange to think that you would need an entire arsenal of security mechanisms just to block an application, but file-sharing programs are no ordinary applications. Many of them are specifically designed to circumvent the usual security defenses.
Blocking peer-to-peer applications
Step 1: Blocking peer-to-peer applications
Step 2: Firewalls
Step 3: Application-level filters
Step 4: Software restriction with Group Policy
|ABOUT THE AUTHOR:|
| Brien M. Posey, MCSE, is a Microsoft Most Valuable Professional for his work with Windows 2000 Server and IIS. He has served as CIO for a nationwide chain of hospitals and was once in charge of IT security for Fort Knox. As a freelance technical writer, he has written for Microsoft, TechTarget, CNET, ZDNet, MSD2D, Relevant Technologies and other technology companies. You can visit his personal Web site at www.brienposey.com.
Copyright 2005 TechTarget