UltraSurf is a hard one to block from ISA itself because it uses the local host computer through port 9666 as it’s proxy to intercept browser requests and encrypt them through 443/SSL traffic through your corporate proxy server. UltraSurf uses a network of anonymous proxies like Botnets that can change dynamically at any given time.
So how can you successfully block it? Well I don’t know if you can totally but you may be able to deter it a bit.
A few ways are:
Policy – Do you have an acceptable use policy in-place? If you do then I would think the threat of job loss and termination should be a darn good deterrent.
At the local host – Using group policy, restrict access to the local host site in IE. That would be 127.0.0.1 and Ultra1 that it resolves to. If you have the capability, restrict TCP port 9666 on the local host outbound. Setting software restriction in group policy is another to prevent the UltraSoft application from running.
On the ISA – Go to
http://www.isaserver.bm and download Steve’s blocking anonymous domain sets and configure a deny access rule to help block anonymous proxy access. You won’t totally stop access but the list will defiantly put a damper on accessing the most popular sites.
اگر کسی نسخه فول این رو هم داشت بذاره !
Problem: Is your traffic sneaking through the “SSL Hole”?
Your organization uses ISA Server 2004 or 2006 in a “forward proxy” scenario for
proxying, caching, controlling and filtering HTTP requests from clients on your LAN out
to the public Internet. Your web clients are configured in one of two ways:
● Clients configured to use ISA as a proxy server, or
● Clients use ISA as their default gateway (i.e. Secure NAT mode)
ISA Server provides industry-leading HTTP application-level filtering capabilities, and
can also leverage a rich community of third-party filters to achieve unprecedented
control over your traffic at an extremely affordable value.
Collective software ClearTunnel is another ISA add-on to help uncover scrupulous activity.
http://www.collectivesoftware.com/Products/ClearTunnel