IT tutorials
 
Technology
 

Windows 8 : Configuring security - Managing Windows Firewall and exceptions (part 2) - Modifying a firewall profile

2/19/2014 3:23:08 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

2. Choosing Windows Firewall with Advanced Security

Sometimes, just allowing applications or features to pass through Windows Firewall is not granular enough for the type of control needed. Specific ports might need to be configured as allowed, or a specific set of ports might need to be blocked to ensure the security of the computer. These types of configurations are best accomplished by configuring Windows Firewall with Advanced Security, which can be accessed from the Windows Firewall application by tapping or clicking the Advanced Settings link.

Figure 2 shows Windows Firewall with Advanced Security before any changes have been made to the configuration.

Note

SECURITY ALERT CONTROLLING ADVANCED SETTINGS

You can control ports and other advanced settings individually only by using the advanced feature set.

Windows Firewall with Advanced Security

Figure 2. Windows Firewall with Advanced Security

Viewing the initial configuration

The initial settings displayed for Windows Firewall with Advanced Security are similar to those for Windows Firewall in Windows 8. The Overview pane, shown in Figure 2, displays each network profile along with information about how it is configured. The domain profile is also displayed in the advanced firewall overview.

Modifying a firewall profile

In Windows Firewall with Advanced Security, a profile is the network type to which the settings apply. Profiles enable the firewall to behave differently, depending on the type of network to which the computer connects. For example, a laptop computer that connects to the contoso.com domain when a user is at work might connect to the wireless network at the local coffee shop on the weekend. Windows might need to block more items on this local network and be more secure than on the contoso.com network. The profiles available for Windows Firewall with Advanced Security enable you to configure these settings.

The profiles available in Windows Firewall with Advanced Security are:

  • Domain Profile Specifies firewall behavior when the computer is connected to a domain

  • Private Profile Specifies firewall behavior when the computer is connected to a private network location (for example, a home network)

  • Public Profile Specifies firewall behavior when the computer is connected to an unsecured or public network

To modify the profile settings, from the Overview pane (see Figure 2), select the Properties link in the Actions pane to open the profiles configuration dialog box shown in Figure 3. Each profile has a tab in the dialog box, and each tab contains the settings for the profile.

Windows Firewall properties

Figure 3. Windows Firewall properties

For each firewall profile, you can configure the following settings:

  • Firewall State Determines whether the firewall is on or off.

  • Inbound Connections Determines how the profile handles inbound connections. The following options are available:

    • Block (Default) Blocks inbound connections that have not been allowed

    • Block All Blocks all inbound connections, including those that have been allowed

    • Allow Does not block inbound connections

  • Outbound Connections Determines how the profile handles outbound connections. The following options are available:

    • Block Does not allow outbound connections

    • Allow (Default) Allows outbound connections

  • Protected Network Connections Identifies the network connections within the computer that are protected by the selected firewall profile. Select Customize to add or remove network connections from a firewall profile.

  • Settings Identifies items that control the overall behavior of the firewall for a profile. Select Customize to modify the following items:

    • Display A Notification Determines whether the firewall will display notifications for this profile.

    • Allow Unicast Response Determines whether the firewall will allow a unicast response to broadcast traffic. A unicast response is a reply directed at the computer broadcasting items rather than broadcasting the response to all hosts on the network.

    • Allow Rule Merging These settings must be configured by using Group Policy, but they allow local rules and Group Policy distributed rules to be used together.

  • Logging Determines the level of logging for traffic the firewall sees by using this profile. Tap or click Customize to configure the following options:

    • Name The path and file name of the log file.

    • Size Limit (KB) The size of the log file.

    • Log Dropped Packets Determines whether packets the firewall discards will be logged; No is the default.

    • Log Successful Connections Determines whether packets passed through the firewall will be logged; No is the default.

 
Others
 
- Windows 8 : Configuring security - Managing Windows Firewall and exceptions (part 1) - Choosing Windows Firewall
- Exchange Server 2010 : Interoperability with Earlier Versions of Exchange
- Exchange Server 2010 : Positioning the Client Access Server in Your LAN (part 2) - Client Redirection, Client Access Arrays
- Exchange Server 2010 : Positioning the Client Access Server in Your LAN (part 1) - Client Access Server Proxying
- SQL Server 2012 Security : SQL Server Instance Security (part 2) - Server Permissions, Endpoints, User-Defined Server Roles
- SQL Server 2012 Security : SQL Server Instance Security (part 1) - Creating a SQL Server Login, Server Roles
- SQL Server 2012 Security : Terminology
- Sharepoint 2013 : SharePoint App Security - Establishing app identity by using S2S trusts (part 3) - Developing provider-hosted apps by using S2S trusts
- Sharepoint 2013 : SharePoint App Security - Establishing app identity by using S2S trusts (part 2) - Configuring an S2S trust
- Sharepoint 2013 : SharePoint App Security - Establishing app identity by using S2S trusts (part 1) - Architecture of an S2S trust
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us