COLUMBIA SCHOOL DISTRICT WEB FILTERING. June 2007 We decided to enter into a 3 year contract with Secure Computing (N2H2) for Web filtering services because.

Slides:



Advertisements
Similar presentations
Welcome to Middleware Joseph Amrithraj
Advertisements

The VeriTrak Enterprise Application Created for The Verification Company By CTO Source, Inc. This presentation provides an overview of the system and links.
Configuring Windows to run Dr.Web scanner remotely.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Web Server Hardware and Software
Security SIG: Introduction to Tripwire Chris Harwood John Ives.
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
1 Enabling Secure Internet Access with ISA Server.
Module 16: Software Maintenance Using Windows Server Update Services.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Norman SecureSurf Protect your users when surfing the Internet.
Network Security Professor Professor Dr. Adeel Akram.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
1 Guide to Network Defense and Countermeasures Chapter 6.
Course 201 – Administration, Content Inspection and SSL VPN
Lieberman Software Random Password Manager & Workflow Delegation.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Barracuda Load Balancer Server Availability and Scalability.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
By: Paul Hill Technology Coordinator Gwinn Area Community Schools.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Chapter 9: Novell NetWare
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
StoneGate SSL VPN 1.2 Technical Overview
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Module 11: Remote Access Fundamentals
RINGS (ResNet Integrated Next Generation Solution) Educause Security Professionals Conference 2006.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Endian Firewall Community Edition Roy Hickman Technology Director Peck Community Schools #
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
Proxy Servers & Firewalls. What is proxy ? What is proxy ? Main purpose of using proxies Main purpose of using proxies How a proxy works ? How a proxy.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 5: Configuring Internet Explorer and Supporting Applications.
Lieberman Software Random Password Manager & Two-Factor Authentication.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Module 7: Advanced Application and Web Filtering.
12/1/2015Faculty : Trần Thị Ngọc Hoa1 ISA server Overview 1. Introducing ISA Server 2. Deployment Scenario for ISA Server.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
© Copyright 2009 Sysgem AG, 8002 Zurich, Switzerland Sysgem File Synchronizer (SFiS) Manage configuration files on multiple target servers from definitions.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
A Network Security -Firewall Bruce Turin.
3/5/2016Faculty : Trần Thị Ngọc Hoa1 From Proxy Server To ISA 2006  Overview  History  Functions  Caching Process  Caching Types  How does it work.
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
Brooke Thorpe COSC 101-Section 7. Overview What is a Firewall? System designed to prevent unauthorized access to or from a private network Will check.
Maintaining and Updating Windows Server 2008 Lesson 8.
Introduction to System Administration. System Administration  System Administration  Duties of System Administrator  Types of Administrators/Users.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Windows Desktop Deployment Service at LANL Mark Wingard Central.
OSSEC HIDS ● Jonathan Schipp ● Dubois County Linux User Group ● Sept 4 th, 2011 ● jonschipp (at) gmail.com.
Deep Serucity 7.0 Training
Module 3: Enabling Access to Internet Resources
Top 5 Open Source Firewall Software for Linux User
Firewall Installation
Module 1: Overview of Systems Management Server 2003
Presentation transcript:

COLUMBIA SCHOOL DISTRICT WEB FILTERING

June 2007 We decided to enter into a 3 year contract with Secure Computing (N2H2) for Web filtering services because I did not believe that AT&T was going to have what we needed in time for school to start (Aug 2007) The 3 year was a 3 for 2 deal. (Cost about $3.00 per computer per year)

What CSD Demanded Ability to filter by groups (teachers, students, office and administrators) Ability to whitelist sites quickly. Ability to allow users to easily request site reviews. Ability to design a system that was difficult to beat. (Integration of filter with other security components)

Components of the Filtering System Management Server Filtering Server Reporting Server (Can be all in one)

Platforms for the Management & Reporting System –Windows 2000 SP4 –Windows 2003 SP2 –Windows 2003 SP1 –Windows XP Pro SP2 –Windows Vista –Red Hat ES 3.0 Update 6 –Red Hat ES 4.0 Update 2 –Red Hat ES 5.0 –Red Hat ES 5.1 –Solaris 8/9/10

Filter Server Platforms (IFP or Proxy) Check Point FireWall-1 Check Point FireWall-1 NGX R65 for Windows 2003 Server SP2 Cisco ASA – Adaptive Security Appliance (via IFP) Cisco Content Engine (via IFP) Cisco IOS Firewall (via IFP) Cisco PIX Firewall (via IFP) Cisco PIX v6.2 and later Microsoft ISA Server 2006 Microsoft ISA Server 2004 Microsoft ISA Server 2000 MS ISA Server 2000 SP2 for Windows 2003 SP2 MS ISA Server 2000 SP2 for Windows 2000 SP4 Nortel (via IFP) Nortel ACC v3.0 or later Nortel ASF SonicWALL (via IFP) SonicWALL v6.3 or later Squid Proxy Server Stratacache (via IFP) Sun Java System Web Proxy Server Sun Java System Web Proxy Server for Solaris 8, 9, and 10 Sun Java System Web Proxy Server for Solaris 8, 9 3Com SuperStack Blue Coat Proxy SG Blue Coat (Network Appliance) NetCache Cisco Content Engine and Content Engine Network Module (supported for SmartFilter and earlier versions) Computer Associates eTrust Intrusion Detection Computer Associates eTrust Secure Content Manager eSoft InstaGate Hewlett Packard TRU64 McAfee Secure Content Management Appliances NetIQ WebMarshal Netopia Parental Controls Novell BorderManager Secure Computing Sidewinder® G2 Firewall™ Secure Computing Sidewinder G2 Security Appliance

COLUMBIA SCHOOL DISTRICT RedHat 5.1 Proxy Server (At each school) Windows 2003 Management/Reporting (Central Office)

PROS 1.I am not at the mercy of AT&T 2.New filter sites updated every night 3.Update deployment is simple 4.Comprehensive Reporting 5.Ability to filter by, IP Address group or by Active Directory groups. 6.Proxy server method reduces network traffic. 7.Easy for users to request reviews. 8.Tech Support is OUTSTANDING!!!

CONS Not a piece of cake to install the Linux server applications. Recompiles Squid. Configuration of the manager was not very intuitive for me. Instructions were not very helpful. Presumed that the installer would understand the terms that were not used in the conventional sense.

MANAGEMENT CONSOLE

Management Console

Management Console 93 Categories

Report Generator