Description | This article explains a step-by-step guide on how to block remote access software for client connections. |
Scope | FortiGate. |
Solution |
Blocking remote applications can be achieved in multiple ways.
To block remote access-related applications, follow these steps:
Important Note: For some application signatures, enabling Deep SSL Inspection is necessary for effective blocking. This feature allows for the inspection of encrypted traffic, ensuring the signature can be properly detected and blocked.
For Web filtering: Web Filter is more focused on controlling web access based on URLs and categories, while Application Control is geared towards managing and securing specific applications running on the network.
Internet service databases can be used when specific software or websites need to be blocked without using security profiles/UTMs.
Below is a screenshot illustrating how to Deny (Application/Website) traffic using a firewall policy with the Internet Service Database as the destination.
If a remote access software lacks an ISDB or Application signature, consider the following alternatives:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.