Hi,
We're having a few issues here with a few (l)users assuming it's OK to use Torrent clients on their work-laptop when they're home (or elsewhere).
I'm not talking about company policy or administrative consequences here !
I'm looking at (technical) ways to prevent users from installing or using a (any) torrent client on our hardware.
Specifically, I'm interested in things I can implement in policies for Endpoint Security 10, either in the Threat Protection or the Firewall.
AFAIK, ENS10 Firewall doesn't inspect the protocol used, so I cannot identify a torrent-stream from any other UDP stream. Port-blocking doesn't seem that usefull either.
I've been thinking about rules to
- prevent the {several torrent client}.EXE from being installed or executed (ENS10-Threat Protection, Access Protection I guess, but how ?)
- prevent the {several torrent client}.EXE from using the network at all (ENS10 Firewall)
This implies I will have to keep a list of torrent clients... (am I happy)
Any ideas ?
Thank you for any help
Serge