IT tutorials
 
Technology
 

Windows 8 : Configuring security - Managing Windows Firewall and exceptions (part 4) - Allowing the secure connection

2/19/2014 3:24:40 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Allowing the secure connection

One of the actions that can be specified when creating a new inbound rule is Allow The Connection If It Is Secure (see Figure 5). This option is useful when an incoming connection needs to be authenticated before it can be allowed.

When this option is selected in the New Inbound Rule Wizard, tap or click Customize to expose additional options for authenticated users and an exceptions list when the rule will be skipped if the connection is attempted by specific user accounts.

The options available here are:

  • Allow The Connection If It Is Authenticated And Integrity-Protected This option allows the connection to succeed only if the initiating party is authenticated and the connection is secured by IPsec. This type of connection is available for Windows Vista and later Microsoft operating systems.

  • Require The Connection To Be Encrypted This connection type forces the connection to be encrypted to ensure privacy of information.

  • Allow The Connection To Use Null Encapsulation This option allows an authenticated connection, but integrity is not required.

  • Override Block Rules This option allows the rule to be overridden for services that must remain available.

To configure new inbound rules, complete the following steps:

  1. Locate Windows Firewall by searching for Firewall on the Start screen and selecting Settings.

  2. Tap or click Windows Firewall in the list of results.

  3. Select Advanced Settings in the navigation pane.

  4. Select Inbound Rules from the navigation pane.

  5. In the Actions pane, select New Rule.

  6. On the first page of the New Inbound Rule Wizard, select the type of rule to create:

    • Program A rule that controls access and connections for a program

    • Port A rule that controls access to a specific port

    • Predefined A rule that controls connections for a Windows Experience

    • Custom A rule with custom options

  7. After selecting the rule type, tap or click Next to continue.

    Depending on the type of rule selected, the next page asks for information about the item to be tracked by the rule. For example, selecting a port rule type asks port-related questions.

  8. Select the type of port to configure the rule against, TCP or UDP.

  9. Select the scope of the rule, All Local Ports or Specific Local Ports.

  10. Enter the specific port number to be monitored by the rule.

  11. Tap or click Next to continue.

  12. Select an action for the rule to take:

    • Allow The Connection Connections on the monitored ports are allowed, secured or not.

    • Allow The Connection If It Is Secure Secure connections to the monitored ports are allowed.

    • Block The Connection Connections to the monitored ports will be blocked.

  13. Tap or click Next to continue.

  14. Select the firewall profiles to which this rule should belong from the following:

    • Domain Applies when the computer is connected to a corporate domain

    • Private Applies when the computer is connected to a private network

    • Public Applies when the computer is connected to a public network

  15. Tap or click Next to continue.

  16. Enter a name and description for the rule.

  17. Tap or click Finish to save and enable the new rule.

Note

SELECTING PROFILES FOR FIREWALL RULES

Profiles are not mutually exclusive, and a rule can be applied by more than one profile.

 
Others
 
- Windows 8 : Configuring security - Managing Windows Firewall and exceptions (part 3) - Configuring IPsec settings
- Windows 8 : Configuring security - Managing Windows Firewall and exceptions (part 2) - Modifying a firewall profile
- Windows 8 : Configuring security - Managing Windows Firewall and exceptions (part 1) - Choosing Windows Firewall
- Exchange Server 2010 : Interoperability with Earlier Versions of Exchange
- Exchange Server 2010 : Positioning the Client Access Server in Your LAN (part 2) - Client Redirection, Client Access Arrays
- Exchange Server 2010 : Positioning the Client Access Server in Your LAN (part 1) - Client Access Server Proxying
- SQL Server 2012 Security : SQL Server Instance Security (part 2) - Server Permissions, Endpoints, User-Defined Server Roles
- SQL Server 2012 Security : SQL Server Instance Security (part 1) - Creating a SQL Server Login, Server Roles
- SQL Server 2012 Security : Terminology
- Sharepoint 2013 : SharePoint App Security - Establishing app identity by using S2S trusts (part 3) - Developing provider-hosted apps by using S2S trusts
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us