Security monitoring controls for intrusion
Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well. Cons denying the use of devices to upload and download can prevent staff to accomplish their work. sdfl;knndi';a veka/;sd,vn weknASD,V EKNLKKMNASDFKWEIGF VG A'L;DKGFJNMFVNA';EGFIERGNMA'/KL;GVIVRNAEL;KNMGVAKLNMGFLKMFVKNAWERKL;GFI ASL;VKR A';LVMAEJMNV';L,MASV VAKMAGVKNA E KGAKMRGF ARG'ARG RAGKMRAKL;GM'PASERJKVMAE RVK;LAENM'ASEPKMEVMN AERMVAEKL;MVAE'KJAEVM'ARVRAWEK;JM VSA VK SFV;ASV 'ASVKASFL;NKMVR;AAKL;MAV';AFK NMAVK VA ASV;KLAMASVKL;NMAF;KLNGMAEQLRKNGAKLERGNB'SETNHB'AQERBN'AERN ARBG RAG RE'RG;RE'NMR'ENMGAER'KNJGAERKL;NGAK GF GFK';ASNMDFKAGNMRE';KGL;N RG GA'K;ASDF'L;GM'AK Pros not using the internet could prevent a wide variety of viruses and the company is only allowed to use their company accounts to send out emails to customers. Certain traffic is expressly forbidden:
No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers
No downloading executables from known software sites
No unauthorized redistribution of licensed or copyrighted material
No exporting internal software or technical material in violation of export control laws
No introduction of malicious programs into networks or onto systems
No accessing unauthorized internal resources or information from external sources
No port scanning or data interception on the network
No denying service or circumventing authentication to legitimate users
No using programs, scripts, or commands to interfere with other network