IT tutorials
 
Technology
 

Windows 8 : Configuring security - Managing Windows Firewall and exceptions (part 1) - Choosing Windows Firewall

2/19/2014 3:21:14 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

The general purpose of a firewall is to stop traffic from accessing computers on a private network or computer system. Windows 8 supports two firewall applications, Windows Firewall and Windows Firewall with Advanced Security. Windows Firewall can help protect an individual computer from harmful or unnecessary traffic. It allows for a simpler configuration set than Windows Firewall with Advanced Security, which provides granular control of specific ports and other options.

With the introduction of Windows Firewall with Advanced Security in Windows Vista, Microsoft offered the ability to configure granular rules about which traffic to allow into or out of a computer system. For example, Windows 8 allows IP version 6 Internet Control Message Protocol (ICMP) echo requests to come in by default. If certain computers should not respond to these requests, the rule allowing the responses can be disabled, and any further responses will fail.

1. Choosing Windows Firewall

Standard configuration options with Windows Firewall include:

  • Allow An App Or Feature Through Windows Firewall This option enables administrators to configure the firewall based on applications that need specific access.

  • Change Notification Settings/Turn Windows Firewall On Or Off Both of these items allow changes to the firewall configuration, including:

    • Enabling/Disabling Windows Firewall Turns the firewall on or off

    • Block All Incoming Connections, Including Those In The List Of Allowed Apps Blocks all incoming traffic to the computer

    • Notify Me When Windows Firewall Blocks A New App Displays a balloon notification when a new app is blocked

  • Restore Defaults This option returns Windows Firewall to its original configuration.

  • Advanced Settings This option opens Windows Firewall with Advanced Security.

  • Troubleshoot My Network This option launches the network troubleshooter.

Figure 1 displays Windows Firewall in its original configuration.

Windows Firewall

Figure 1. Windows Firewall

In addition to the configurable options of the standard firewall, the initial window displays the status of the firewall for each configured network type.

Windows Firewall can block or allow access to applications installed on Windows 8. For example, Tailspin Toys has a written policy covering the use of chat applications on company computer systems. Because the organization has internal instant messaging (IM) to provide an additional way for employees to communicate, public chat clients are not allowed, and Windows Firewall blocks them. However, with the evolution of social media and Internet marketing to help grow the business of Tailspin Toys, this policy has been reviewed, and some applications are being allowed for some individuals. By configuring Windows Firewall, you can control which applications are allowed to access the network and the Internet. The system administrator can designate applications to use in the Tailspin Toys social media marketing campaign while still preventing the use of public IM clients on the network.

Configuring Windows Firewall to allow specific apps

To configure Windows Firewall to allow an application through, complete the following steps:

  1. Search for Firewall on the Start screen and select Settings.

  2. Tap or click Windows Firewall in the list of results.

  3. Tap or click Allow An App Or Feature Through Windows Firewall.

  4. Tap or click Change Settings to grant the elevated permissions necessary to change firewall settings.

  5. To allow an app already known by Windows Firewall, scroll through the Allowed Apps And Features list and select the check box next to the name of the app.

  6. Select Private to allow the app when connected to private networks or select Public to allow it when connected to public networks.

  7. Tap or click Allow Another App to browse for an application that is not listed.

  8. Tap or click OK to save the new settings.

After configuring a rule to allow the application through the firewall, open the application to ensure that it can access necessary resources. If the app does not function as needed, select the firewall rule associated with it again.

Removing an app from a Windows Firewall configuration

You can remove an app that you have previously granted access through the firewall. This works only with apps you have added to the list; it does not work with Windows 8 apps or services. To remove the previously allowed application, complete the following steps:

  1. Locate Windows Firewall by searching for Firewall on the Start screen and selecting Settings.

  2. Tap or click Windows Firewall in the list of results.

  3. Select Allow An App Or Feature Through Windows Firewall.

  4. Locate the application you want to remove from the Allowed Apps And Features List.

  5. Select the application, and then tap or click Remove. In the confirmation dialog box, tap or click Yes.

 
Others
 
- Exchange Server 2010 : Interoperability with Earlier Versions of Exchange
- Exchange Server 2010 : Positioning the Client Access Server in Your LAN (part 2) - Client Redirection, Client Access Arrays
- Exchange Server 2010 : Positioning the Client Access Server in Your LAN (part 1) - Client Access Server Proxying
- SQL Server 2012 Security : SQL Server Instance Security (part 2) - Server Permissions, Endpoints, User-Defined Server Roles
- SQL Server 2012 Security : SQL Server Instance Security (part 1) - Creating a SQL Server Login, Server Roles
- SQL Server 2012 Security : Terminology
- Sharepoint 2013 : SharePoint App Security - Establishing app identity by using S2S trusts (part 3) - Developing provider-hosted apps by using S2S trusts
- Sharepoint 2013 : SharePoint App Security - Establishing app identity by using S2S trusts (part 2) - Configuring an S2S trust
- Sharepoint 2013 : SharePoint App Security - Establishing app identity by using S2S trusts (part 1) - Architecture of an S2S trust
- Sharepoint 2013 : SharePoint App Security - Establishing app identity by using OAuth (part 3) - Developing with OAuth - Working with access tokens
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us