- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
Hello,
I would like to know what Service object do you prefer to use to restrict access to Active Directory services.
In Application Control Blade there is a Application signature "Active Directory"
policy rule:
Or do you prefer to place in Service & Application column all needed services:
Which one is the more secure ?
Thanks
If an Application Control signature exists, you should use it.
In terms of the ports allowed, they are identical.
The signature does provide extra checking.
The answer would depend on how your LDAP server has been configured. If the server listens on TCP and UDP port 389, which is the default configuration, then you would have to include the following services:
ldap_udp(UDP/389)
ldap(TCP/389)
If your question is about which is the most secure protocol, then the answer would be ldap-ssl(TCP/636) as it will allow LDAP-related traffic to be encrypted.
Once again though, the service selected will depend on your LDAP server's configuration.
Thanks Nicholas,
Thanks you for your answer,
Maybe I was not so clear.
There is Application Signature "Active Directory" which should recognized all Active Directory services (tcp/135, tcp/138, ldap_udp, ldap, Kerberos, nbname ......)
So my question is what is more secure/preferable to use in Services & Applications column:
OR
Thanks
If an Application Control signature exists, you should use it.
In terms of the ports allowed, they are identical.
The signature does provide extra checking.
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY