We redirect ours to an internal webpage that lets the user know the site was 
blocked and then we can look thru the logs to see who has been trying to go 
where.

...Tim

From: Ziots, Edward [mailto:[email protected]]
Sent: Tuesday, May 04, 2010 12:22 PM
To: NT System Admin Issues
Subject: RE: Internet Policies

Yep the good old "blackhole" technique, most of the naughty domains are going 
to 127.0.0.1 which helps if the malware is programmed to go back to a specific 
domain name, but that doesn't help those malware that is using google or other 
public available sites, that might have been compromised to get back to its 
instruction set.

Also there is the fast-flux domains which is usually tied with malware/botnets, 
that this approach has a good affect on. Again nothing is full proof but if you 
can reduce your risk and quickly, that is better than sitting there praying for 
forgiveness after you get owned.

Z

Edward Ziots
CISSP,MCSA,MCP+I,Security +,Network +,CCA
Network Engineer
Lifespan Organization
401-639-3505
[email protected]

From: Devin Meade [mailto:[email protected]]
Sent: Tuesday, May 04, 2010 2:44 PM
To: NT System Admin Issues
Subject: Re: Internet Policies

I used a "fake DNS" entry for twitter.com<http://twitter.com> and the others 
that I found in the ISA log.  I made a new forward lookup zone for each one in 
our Active Dir integrated DNS system.  I know it wont block sub-domains but it 
made the point.  It has since been removed.  I can use Trend micro officescan 
if we want to actively block though.
Devin
On Tue, May 4, 2010 at 1:22 PM, John Aldrich 
<[email protected]<mailto:[email protected]>> wrote:
I was aware of that, but I was wondering what Devin's company used. :) 
Personally, I'd go for either DNS (if there was a blackhole or something easily 
implemented like that) or web filtering appliance.

[cid:[email protected]][cid:[email protected]]

From: Andrew S. Baker [mailto:[email protected]<mailto:[email protected]>]
Sent: Tuesday, May 04, 2010 2:20 PM

To: NT System Admin Issues
Subject: Re: Internet Policies

They can be blocked via DNS, via Firewalls, via Web Filtering technologies.

-ASB: http://XeeSM.com/AndrewBaker
On Tue, May 4, 2010 at 2:11 PM, John Aldrich 
<[email protected]<mailto:[email protected]>> wrote:
How did you block them? Do you have an appliance or did you put in some sort of 
DNS entries?

[cid:[email protected]][cid:[email protected]]

From: Devin Meade [mailto:[email protected]<mailto:[email protected]>]
Sent: Tuesday, May 04, 2010 1:21 PM

To: NT System Admin Issues
Subject: Re: Internet Policies

Up until last month we blocked all the social networking sites.  Now our firm 
is marketing on them.  We are adjusting our policies for this.  It will be on a 
user-by-user basis though.
Devin
On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
<[email protected]<mailto:[email protected]>> wrote:
What restrictions, if any, do your organizations place on things like IM or 
social networking sites? I sent out a warning to the office personnel this 
morning regarding the new "IM Virus" and got an email back from the CEO 
basically stating "shouldn't that be a violation of company policy anyway?" and 
I had to tell him, I knew of no policies regarding that; and that in fact, my 
former supervisor was fully aware of at least one person (who's child is 
overseas in the military) who used IM on a semi-regular basis.
For this reason, I'm working on coming up with a company policy. I've looked at 
the sample template from SANS as well as another one that someone sent me 
off-list. I'm planning on incorporating the best of everything I get, so if 
anyone has any suggested language regarding IM or social networking, please let 
me have it. :)

[cid:[email protected]][cid:[email protected]]

































~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

<<inline: image001.jpg>>

<<inline: image002.jpg>>

Reply via email to