نمایش نتایج: از شماره 1 تا 2 از مجموع 2

موضوع: Fun with Forefront TMG Beta 3 and blocking download

  
  1. #1
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272

    Fun with Forefront TMG Beta 3 and blocking download

    کد:
    http://www.carbonwind.net/Forefront_TMG/File_Types/File_Types_1.htm
    Fun with Forefront TMG Beta 3 and blocking download of certain file types over HTTP based on the server's response body: Part 1

    1. Intro
    Say you have a Forefront TMG (Beta 3) and you want to block users from downloading '.exe' files, pdf files, some audio files, some video files, etc or certain archives like RAR, 7-Zip, .etc.
    Please note that when one browses a web site, it may "download" html pages, image files, '.css' files, .'js' files, .etc. I've mentioned this, as the term "download" may be "misleading", like "I want users to view images but not to download them"(yeah, I know this may sound funny, but I haven't say it). Actually this may have kind of a sense(but I somehow doubt this was the sense used when I've heard it) if you want the browser to not display an image automatically, rather to prompt the user, which we can do using the HTTP header Content-Disposition with attachment. The usual approach to this is to deal with(assuming you're not using a third-party add-on) on ISA Server 2006/Forefront TMG Beta 3:
    - block extension '.desired extension' within URL request: request file, see Figure1. Note that although we can "whitelist" the allowed extensions, in practice this may not represent a feasible solution for web browsing, as it can become difficult to manage and even so, for example with all the URL rewrite techniques employed by various web sites, we can endup blocking legitimate traffic.
    - block extension '.desired extension' within URL request: URL string, see Figure2. Note that we don't neccessary have to straight request a certain file(request URL to end with the needed file), and thus we may may more flexibility with this approach than with the blocked desired extensions within the Extensions tab of the HTTP Filter.
    - block content type: 'x/y'. We can use Forefront TMG Beta 3's built-in content types, see Figure3 and Figure4. This approach may be a more feasible way of "whitelisting" allowed content type. And we may block like so responses from web servers whose admins don't want to play by the rules, and decide to use their own content types for certain files.
    Or manually block the undesired content type by signature, see Figure5, we loose the "whitelisting" approach like so.
    - block content transferred with content-disposition header: '.desired extension', see Figure6. The content-disposition header typically may be used in combination with the content-type one, to tell the browser how to handle a file, for example, if we use only the content-type header for image files, say .jpeg files(Content-Type: image/jpeg) the browser will immediatelly display the image, but if we add a Content-Disposition: attachment; filename=foo.jpeg; header, this image should be displayed to the user only if the user requests it(browser prompt, generally speaking: a way to force the manual download).

    Figure1: Forefront TMG Beta 3 - HTTP Filter: Extensions tab - Block .exe

    Figure2: Forefront TMG Beta 3 - HTTP Filter: Signatures tab - Block string from request URL

    Figure3: Forefront TMG Beta 3: Content Types

    Figure4: Forefront TMG Beta 3 Content Types - Application

    Figure5: Forefront TMG Beta 3 - HTTP Filter: Signatures tab - Block Content Type

    Figure6: Forefront TMG Beta 3 - HTTP Filter: Signatures tab - Block Content Disposition
    You may like to read:
    - Hypertext Transfer Protocol -- HTTP/1.1, section 14.17 Content-Type
    - Communicating Presentation Information in Internet Messages: The Content-Disposition Header Field
    - Multimedia MIME Reference
    - Test Cases for HTTP Content-Disposition header and RFC 2231/2047 Encoding
    - Application of RFC 2231 Encoding to Hypertext Transfer Protocol (HTTP) Headers (draft-reschke-rfc2231-in-http-latest)
    If we cover all these, then we can come up with a pretty nice content type control, indeed this is a manual approach and we have to work a little bit, but if you buy Forefrong TMG you can do all these free of charge.
    We may have dealt like so with many situations we may come across.
    Still, there are certain cases we cannot cover like so.
    As you have noted from above, on Forefront TMG Beta 3, we do not identify the real file type, rather we make decisions based on the HTTP headers(request and response headers).
    Imagine a web server admin that changes on his web server the MIME type for '.zip' archives from application/x-zip-compressed to application/octet-stream or so. Depending on how a certain file is requested, and what we've allowed and blocked, our restrictions may be bypassable.
    Or the simpler case when a user changes a file's extension from '.zip' or '.exe' to '.jpg'(image file, something unlikely you will block), and uploads it to a file sharing web server or emails it using a web mail service like the one from Yahoo! to a friend of him or her, and this friend while at work behind Forefrong TMG downloads that file and then renames its extension. If you may want to allow the Yahoo! webmail or some file sharing web servers(this may vary based on your business type), even not very smart users can bypass your file (content types) restrictions like so.
    Also note that for example, if you want to block users from downloading '.exe' files, such files can be archived, so if you don't block archived files, you may only partially block(the nature of blacklisting) the downloading of '.exe' files.
    So can we instruct Forefront TMG Beta 3 to avoid somehow the renaming extension situation and have a way to identify certain file types, and complement somehow the usual approach described above ?
    If we look at what we have by default on TMG Beta 3, the answer could be: maybe. Note that what we can do bellow, we may be able to do with ISA Server 2006, but I want to mention a new feature of TMG Beta 3, feature which if Microsoft gives us access to it, we may have a smarter way of identifying and blocking certain file types accessed by users.
    Avoiding the renaming extension situation might be accomplished with some add-ons(which also incorporate other features and provide many other benefits) for ISA Server(currently, as writing, Forefront TMG is in its beta stages, so you may find few add-ons for it). However, these add-ons may not come as free, and for the moment you may not be willing to invest in such a solution.
    The downside to the manual approach from bellow is that you will have to work a little, sometimes a little more, and is not very precised, flexible or a smart approach.
    Also, we just blacklist certain responses from the web servers, it's not a whitelisting approach.
    A file has a header(+ sub headers) incorporating a specific string(s) which helps us identifying what that file is(I know that this may sound lame in certain contexts, but let assume the users won't try so hard - ).
    Thus we need to search and identify the specific string(s) to block a certain file type. The accuracy of the signature, at a certain extent, will depend on the string(s) we will use to block a certain type of file and the way we can write this signature.
    We mainly need three things: a hex editor, Google(or your favorite search engine) and Wireshark(or your favorite protocol analyzer).
    The hex editor is needed to open the file and look at it.
    Google is needed(or maybe not if you are pretty sure of yourself) to search for specific files headers(sub headers), so we can get directions(if needed) or just confirm our findings.
    Wireshark is needed if we want to analyze a specific server's response for the pattern we want to block.
    I will use bellow Forefront TMG Beta 3 to demonstrate the process.
    Now, as can be seen from Figure7, when we configure Forefront TMG Beta 3/ISA Server 2006 to search through the HTTP (response) body, we may introduce some performance issues.
    So we must define carefully our signature to limit these issues. Remember that unless we look at the HTTP response body, we will not be able to indeed say the type of the file being downloaded.
    Also note that this is a primitive form of search, we rather search for a "keyword", instead would have been more useful if we could have used a regex.

    Figure7: Forefront TMG Beta 3 - Warning HTTP body search
    2. Overview
    But before we proceed, let's have a look at some web servers reponses for a requested file, and highlight that in various cases simply analyzing the HTTP headers from the server's response may not be enough to determine the real type of a file(so far we've just discussed this in theory).
    First a simple web server response for a ZIP archive download request using Wireshark, see Figure8(click on the image for the full picture):

    Figure8: Wireshark - Simple web server's reponse for a ZIP archive download request
    I'm calling it simple because it was a straight request for a ZIP archive, and the response is using just the HTTP content-type header, all by the rules.
    Now let's take a look at a more "complicated" request and response. For example for downloading a ZIP archive(attachment download) from Yahoo! webmail, see Figure9 and Figure10(click on the images for the full pictures):

    Figure9: Wireshark - Web server's reponse for a ZIP archive download request(Yahoo! webmail ZIP attachment download)

    Figure10: Wireshark - Web server's reponse for a ZIP archive download request(Yahoo! webmail ZIP attachment download): Follow TCP Stream
    We can say it's a more "complicated" request because it's not a straight request for specific file(rather the requested file is found somewhere in the requested URL, see Figure10). This will mean that you cannot block the request using the Extensions tab of the HTTP filter on ISA Server/Forefront TMG. But you can block it if you block with a signature the '.zip' string in the requested URL.
    We can say it's a more "complicated" response because it uses both the content-type and the content-disposition HTTP headers. But they are both in the correct format, playing by the rules, so you can block it by content-type or/and content-disposition.
    Now let's raise the bar a little.
    Let's straight request a ZIP archive, but "mangle" a little bit the server's response.
    For doing that I will add the following(simple test) on a Apache test web server, see Figure11:

    Figure11: Apache Config
    I could have done something on an IIS 6.0 server with MIME Types, see Figure12(click on the image for the full picture), but the Apache test web server was handy next to me and I want to "mangle" the content-disposition headers too.

    Figure12: IIS 6 - Mime Types
    If we now analyze with Wireshark the test web server's response for our request, we will see something like in Figure13(click on the image for the full picture):

    Figure13: Wireshark - Web server's "mangled" reponse for a ZIP archive download request
    As can be noted from Figure13 we cannot use anymore the content-type or/and content-disposition headers to block the download of ZIP archives.
    Speaking about changing the extension, say I've emailed to a friend(who is using Yahoo! webmail) the '.zip' file as '.jpg', and he will download it like a '.jpg' and then rename it as '.zip', see Figure14(click on the image for the full picture), note that Wireshark senses this is not a valid JPEG object:

    Figure14: Wireshark - Yahoo! .jpg attachment
    As can be noted from Figure14 we cannot use anymore the content-type or/and content-disposition headers or URL extension or URL string block to block the download of ZIP archives if the user changes the extension.
    If you've looked carefully at the HTTP reponses we've pictured so far, you may have obeserved that a certain pattern repeats in those responses, if we refer to '.zip' archives.
    Before we end our fun, I will do one more thing. This is a little silly and not very practical.
    Say, force GZIP HTTP compression on jpg files on my test Apache web server.
    Note that a web server may force HTTP compression on some files even if the client(which could be the web proxy) does not request HTTP compression, it's not against current RFC standards.
    The silly and impractical part is that I forced HTTP compression on the web server for '.jpg' files('.jpg' images are already compressed), see Figure15.
    I will do so because HTTP compression will "alter" the server's response, and the needed string to block in the server's response body will be "hidden".

    Figure15: Apache Config
    Let's take a look, web server's response decompressed, see Figure16(click on the image for the full picture), note that Wireshark senses that the '.jpg' file is not a true JPEG file:

    Figure16: Decompressed web server's answer - .zip as .jpg forced compression
    Web server's response compressed, see Figure17(click on the image for the full picture)

    Figure17: Compressed web server's answer - .zip as .jpg forced compression
    And as can be noted from Figure17, now, if the web proxy is not able to decompress the web server's "forced crompressed response", and just let's it pass through, we may not be able to block the needed string.
    TMG Beta 3 is configured by default to request compression, see Figure18(click on the image for the full picture).
    On ISA Server 2006 you may need to manually configure that.

    Figure18: Forefront TMG Beta 3 - Default HTTP Compression Settings
    So, as we have seen, even if the web server plays by the rules, for example, when an user may change the file extension to something common like a popular image extension, unless we analyze the file itself we won't be able to tell the real type of the file by just looking at its extension and the HTTP header from the web server's response.
    Also, as already said, what we will do bellow, it's just blacklisting and not whitelisting, so if a "determined" user finds a way "to pack" his files, he may bypass your restrictions





    موضوعات مشابه:

  2. #2
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272
    کد:
    http://www.carbonwind.net/Forefront_TMG/File_Types/File_Types_2.htm
    Fun with Forefront TMG Beta 3 and blocking download of certain file types over HTTP based on the server's response body: Part 2

    - 1. RAR archives
    - 2. '.mp3' audio files
    - 3. '.pdf' files
    - 4. Flash content
    - 4.1. '.flv' files (Flash video)
    - 4.2 '.swf' files (ShockWave Flash)
    - 4.3 '.cws' files (FWS files compressed with ZLIB)
    - 5. 7-Zip archives
    - 6. GZIP archives
    - 7. BZip2 archives
    - 8. ZIP archives
    - 9. '.msi' and '.msp' files
    - 10. Windows Executable Content
    - 11. A few words


    The bellow document, File Signatures Table, written by Gary C. Kessler, might help you with TMG's HTTP filter signatures:
    File Signatures
    1. RAR archives
    Say you want to block responses containing RAR archives(note that we won't cover now the Windows self-extracting RAR archives).
    A quick Google search about RAR files format and we may find this:
    WinRAR download and support. WinRAR is a powerful Windows tool to compress and decompress zip, rar and many other formats: Knowledge Base
    Let's open a RAR archive within a hex editor, see Figure17:

    Figure17: RAR Archive - Hex View
    As can be noted from Figure17, I've already marked(with red color) some bytes. We need to instruct TMG Beta 3 to block this string in the web server's response.
    Figure18 and Figure19 shows us a possible signature to block responses containing RAR archives. As can be seen from Figure18 I've limited the byte range, as we usually search a few "start bytes".

    Figure18: Forefront TMG Beta 3 - Block responses containing RAR archives by hex signature

    Figure19: Forefront TMG Beta 3 - Enabled signatures
    And now, if I simply change the extension of a '.rar' file to a '.jpg' one and attempt to download it, Forefront TMG Beta 3 should block this cheap trick, see Figure20:

    Figure20: Forefront TMG Beta 3 - Blocked "masked" RAR archive
    2. '.mp3' audio files
    Say you want to block responses containing '.mp3' audio files.
    A quick Google search about '.mp3' files format and we may find this:
    ID3 - Wikipedia, the free encyclopedia
    Let's open a '.mp3' file within a hex editor, see Figure21:

    Figure21: '.mp3' file - Hex View
    As can be noted from Figure21, I've already marked(with red color) some bytes. We need to instruct TMG Beta 3 to block this string in the web server's response.
    Figure22 shows us a possible signature to block responses containing '.mp3' files. As can be seen from Figure22 I've limited the byte range, as we usually search a few "start bytes".

    Figure22: Forefront TMG Beta 3 - Block responses containing '.mp3' audio files by hex signature
    3. '.pdf' files
    Say you want to block responses containing '.pdf' files.
    A quick Google search about '.pdf' files format and we may find this:
    http://blogs.adobe.com/insidepdf/Com...ity_090819.pdf
    Let's open a '.pdf' file within a hex editor, see Figure23:

    Figure23: '.pdf' file - Hex View
    As can be noted from Figure23, I've already marked(with red color) some bytes. We need to instruct TMG Beta 3 to block this string in the web server's response.
    Figure24 shows us a possible signature to block responses containing '.pdf' files. As can be seen from Figure24 I've limited the byte range, as we usually search a few "start bytes".

    Figure24: Forefront TMG Beta 3 - Block responses containing '.pdf' files by hex signature
    4. Flash content
    This could be an interesting one, giving the recent Adobe Flash Player security flaws.
    You can have a chance of blocking flash content at the gateway, if flash is not needed for your business.
    By flash content we may understand the following:
    - 4.1 '.flv' files (Flash video)
    - 6. '.swf' files (ShockWave Flash)
    - 7. '.cws' files (FWS files compressed with ZLIB)
    4.1 '.flv' files (Flash video)
    Say you want to block responses containing '.flv' files.
    A quick Google search about '.flv' files format and we may find these:
    Beginner's Guide to Distributing Flash Video > File Formats: SWF, FLV, and HTML
    Flash Video - Wikipedia, the free encyclopedia
    Macromedia Flash SWF File Format, Version 7
    Flash Video (FLV) Open Source Flash
    Let's open a '.flv' file within a hex editor, see Figure25:

    Figure25: '.flv' file - Hex View
    As can be noted from Figure25, I've already marked(with red color) some bytes. We need to instruct TMG Beta 3 to block this string in the web server's response.
    Figure26 shows us a possible signature to block responses containing '.flv' files. As can be seen from Figure26 I've limited the byte range, as we usually search a few "start bytes".

    Figure26: Forefront TMG Beta 3 - Block responses containing '.flv' files by hex signature
    4.2 '.swf' files (ShockWave Flash)
    Say you want to block responses containing '.swf' files.
    A quick Google search about '.swf' files format and we may find these:
    Beginner's Guide to Distributing Flash Video > File Formats: SWF, FLV, and HTML
    Adobe Flash - Wikipedia, the free encyclopedia
    hiv aids statistics ovulation test at half-serious.com
    Macromedia Flash SWF File Format, Version 7
    Let's open a '.swf' file within a hex editor, see Figure27:

    Figure27: '.swf' file - Hex View
    As can be noted from Figure27, I've already marked(with red color) some bytes. We need to instruct TMG Beta 3 to block this string in the web server's response.
    Figure28 shows us a possible signature to block responses containing '.swf 'files. As can be seen from Figure28 I've limited the byte range, as we usually search a few "start bytes".

    Figure28: Forefront TMG Beta 3 - Block responses containing '.swf' files by hex signature
    4.3 '.cws' files (FWS files compressed with ZLIB)
    Say you want to block the responses containing '.cws' files.
    A quick Google search about '.cws' files format and we may find these:
    Macromedia Flash SWF File Format, Version 7
    cws2fws - CWS SWF Flash file decompressor
    Let's open a '.cws' file within a hex editor, see Figure29:

    Figure29: '.cws' file - Hex View
    As can be noted from Figure29, I've already marked(with red color) some bytes. We need to instruct TMG Beta 3 to block this string in the web server's response.
    Figure30 shows us a possible signature to block responses containing '.cws' files. As can be seen from Figure30 I've limited the byte range, as we usually search a few "start bytes".

    Figure30: Forefront TMG Beta 3 - Block responses containing '.cws' files by hex signature
    5. 7-Zip archives
    Say you want to block responses containing 7-Zip archives(note that we won't cover now the Windows self-extracting 7-Zip archives).
    Let's open a 7-Zip archive within a hex editor, see Figure31:

    Figure31: 7-Zip Archive - Hex View
    As can be noted from Figure31, I've already marked(with red color) some bytes. We need to instruct TMG Beta 3 to block this string in the web server's response.
    Figure32 shows us a possible signature to block responses containing 7-Zip archives. As can be seen from Figure32 I've limited the byte range, as we usually search a few "start bytes".

    Figure32: Forefront TMG Beta 3 - Block responses containing 7-Zip by hex signature
    6. GZIP archives
    Say you want to block responses containing GZIP archives.
    Note: The bellow signature will not block HTTP compression(using GZIP) if you configure Forefront TMG Beta 3 to request HTTP compression(I did not test with ISA Server 2006, but it shouldn't be any problems there either).
    Although a GZIP compressed web server answer will contain the same beginning hex string, see Figure33, Forefront TMG Beta 3 will first decompress it, see Figure34, and then apply the HTTP inspection.
    See this for more details:
    HTTP Compression Concepts in ISA Server 2006
    Where it says that:
    Compression Filter. This filter is responsible for compression and decompression of HTTP requests and responses. This filter has a high priority, and is high in the ordered list of Web filters. This is because the filter is responsible for decompression. Decompression must take place before any other Web filters inspect the content.
    If you do not configure Forefront TMG Beta 3 to request HTTP compression, and the web server forces HTTP compression(GZIP), this signature will block the compressed web server's response.

    Figure33: Wireshark - Web server's answer: Compressed

    Figure34: Wireshark - Web server's answer: Decompressed
    A quick Google search about GZIP files format and we may find this:
    RFC 1952 GZIP File Format Specification version 4.3
    Let's open a GZIP archive within a hex editor, see Figure35:

    Figure35: GZIP Archive - Hex View
    As can be noted from Figure35, I've already marked(with red color) some bytes. We need to instruct TMG Beta 3 to block this string in the web server's response.
    Figure36 shows us a possible signature to block responses containing GZIP archives. As can be seen from Figure36 I've limited the byte range, as we usually search a few "start bytes".

    Figure36: Forefront TMG Beta 3 - Block responses containing GZIP archives by hex signature
    7. BZip2 archives
    Say you want to block responses containing BZip2 archives.
    A quick Google search about BZip2 files format and we may find this:
    bzip2 - Wikipedia, the free encyclopedia
    Let's open a BZip2 archive within a hex editor, see Figure37:

    Figure37: BZip2 Archive - Hex View
    As can be noted from Figure37, I've already marked(with red color) some bytes. We need to instruct TMG Beta 3 to block this string in the web server's response.
    Figure38 shows us a possible signature to block responses containing BZip2 archives. As can be seen from Figure38 I've limited the byte range, as we usually search a few "start bytes".

    Figure38: Forefront TMG Beta 3 - Block responses containing BZip2 archives by hex signature
    8. ZIP archives
    Say you want to block responses containing ZIP archives(note that we won't cover now the Windows self-extracting ZIP archives).
    A quick Google search about ZIP files format and we may find this:
    Zip File Format
    Let's open a ZIP archive within a hex editor, see Figure39:

    Figure39: ZIP Archive - Hex View
    As can be noted from Figure39, I've already marked(with red color) some bytes.
    And now the "fun" begins. The approach we've used so far will work no more. If we create a signature, see Figure40, for the marked bytes from Figure39, we will block web server responses containing other file types.

    Figure40: Forefront TMG Beta 3 - Block responses containing ZIP archives by hex signature
    For example, in Figure41 I've pictured some other files types which might get blocked by the above signature, say Microsoft Office '.pptx', '.docx', '.xlsx' files; or Open Office '.odt', '.ods', '.odp', '.sxw', '.sxc', '.sxi' files; or '.jar'(Java archive) files or '.xpi' files(adding Mozilla Firefox add-ons might get blocked, as TMG Beta 3 has the ability of inspecting outbound SSL traffic).

    Figure41: 'PK' Multiple File Types - Hex View
    If we configure Forefront TMG Beta 3 to search through more bytes, with another signature(s) we might be able to shrink down the file types to be blocked(I did not try this).
    If the HTTP filter would have had the ability of constructing more advanced signatures, say using regex, we might have been able, with some extra work, to get more finesse with our signatures.
    9. '.msi' and '.msp' files
    Say you want to block responses containing '.msi'(Microsoft Windows Installer) and '.msp'(Windows Installer patch) files.
    Let's open a '.msi' file and '.msp' file within a hex editor, see Figure42 and Figure43:

    Figure42: '.msi' file - Hex View

    Figure43: '.msp' file - Hex View
    As can be noted from Figure42 and Figure43, I've already marked(with red color) some bytes. As above with .zip archives, if we create a signature, see Figure44, for the marked bytes from Figure42 or Figure43, we will block web server responses containing other file types.

    Figure44: Forefront TMG Beta 3 - Block responses containing '.msi' and '.msp' files by hex signature
    For example, in Figure45 I've pictured some other files types which might get blocked by the above signature, say Microsoft Office '.ppt', '.doc', '.xls', '.vsd', '.pps' files; or Visual Studio '.suo' files.

    Figure45: Multiple File Types - Hex View
    As with the '.zip' files, it would have been handy if the HTTP filter would have had the ability of constructing more advanced signatures, say using regex.
    10. Windows Executable Content
    Say you want to block responses containing Windows executable content.
    As can be seen I haven't say '.exe' files. This is because bellow we will block web server's responses that begin with the 'MZ' string. And this does not mean only '.exe files', for example it means DLLs too.
    Actually there is a setting on Forefront TMG Beta 3 HTTP Filter that does that, see Figure46:

    Figure46: Forefront TMG Beta 3 HTTP Filter - Block responses containing Windows executable content
    Let's open an '.exe' file within a hex editor, see Figure47:

    Figure35: Windows .exe file - Hex View
    As can be noted from Figure47, I've already marked(with red color) some bytes.
    If we create a signature, like see Figure48, for the marked bytes from Figure47, we will block web server responses containing other file types.

    Figure48: Forefront TMG Beta 3 - Block Windows executable content by hex signature
    For example, in Figure49 I've pictured some other files types which might get blocked by the above signature, say '.dll', '.scr', '.ocx', '.sys', '.ax' or '.com' files.

    Figure49: 'MZ' Multiple File Types - Hex View
    11. A few words
    As we saw, the feature of the HTTP filter we've used above has certain limitations.
    I've used Forefront TMG Beta 3 for a certain reason(remember I've mentioned this somewhere in the fist part), and this reason is the new NIS feature(IPS).
    If Microsoft would allow us to create our own signatures for it, I would guess that we can come up with more complex expressions in matching certain file types based on the servers' responses.
    Maybe it's not quite what Microsoft think about the NIS, but...
    Also, with NIS we might put a signature just in detect mode, and log "bad" habits, as we saw from above, the logs on TMG Beta 3 do not show us what exactly disallowed sequence of characters the response contained, thus if we have multiple signatures like above, it may be a problem to tell what happended.
    With a NIS signature, we will know what signature kicked in.
    So let's wait and see what moves Microsoft will make in the future regarding the NIS.







کلمات کلیدی در جستجوها:

exe decompressor

2

tkhag eetjophg b d hjv y

.exe decompressor

1

flash playerدانلود آخرين isa server 2006 block flash player websites videoswireshark network analysis tcp compress gzipwireshark network analysis pdf compress gzipblock downloading files with forefront tmgmp3 streaming forefront tmgblock media files downloading in tmgnetwork analysis tcp compress gzipTMG how to unblock uploadstmg blocking flash exe installforefront threat management gateway wont let me download adobe flash playerhow to block upload and downloading in forefront tmgtcp header hexgzip forefront tmg 2010block flash forefrontblock application using signature in tmg 2010forefront pdftmg blocking the yahoo attachement in firefoxmime for tmg 2010block file upload forefront tmg

برچسب برای این موضوع

مجوز های ارسال و ویرایش

  • شما نمی توانید موضوع جدید ارسال کنید
  • شما نمی توانید به پست ها پاسخ دهید
  • شما نمی توانید فایل پیوست ضمیمه کنید
  • شما نمی توانید پست های خود را ویرایش کنید
  •