> > I have to say, I agree with Robert here, in that if you 
> > want to control traffic at your server itself (host security), 
> > rather than or in addition to controlling traffic at the 
> > router and firewall, the OS provides all the tools you need. 
> > Windows NT 4 and higher allow you to block incoming traffic
> > on all ports except those you explicitly list, using the 
> > TCP/IP Filtering dialog, and Windows 2000 gives you even 
> > greater control using IP security policies. In some respects, 
> > this is better than using something like BlackICE, in my 
> > opinion, because it's free, and if you manage multiple Win2K
> > servers you can even use the same policies on all of them.
> 
> I don't remember the ability to do statefull filtering in any 
> of these tools.

Nope. That's what external firewalls are for. My approach to host-based
security is generally just to disallow as much traffic as I can; I don't
know what kind of performance hit you'd take with doing that on each host,
and I don't want to find out. I guess I shouldn't have said "the OS provides
all the tools you need" if you're not going to use an external firewall,
though.

If you do want that functionality, though, and you don't want to pay for it,
you might look at Snort:
http://www.snort.org/

Securityfocus has a good article on using Snort on IIS servers, but I can't
find the URL to save my life. So instead, I'll post this:
http://www.snort.org/docs/snort-win2k.htm

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
voice: (202) 797-5496
fax: (202) 797-5444
______________________________________________________________________
Get the mailserver that powers this list at http://www.coolfusion.com
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to