Planning Desktop Security Policy
Balance considerations of security and convenience. A policy should permit desktop users to work as freely as possible, but also reduce the threat of attack from malicious third parties.
-
In the Inbound policy, allow only services that connect to a specific server running on the relevant port.
-
In the Outbound policy, use rules to block only specific problematic services (such as Netbus), and allow all others.
-
Remember: Implied rules may allow or block services not explicitly handled by previous rules. For example, if the user runs an FTP server, the inbound rules must explicitly allow connections to the FTP server.