IT tutorials
 
Technology
 

Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 3) - Managing firewall profiles - Configuring profiles, Configuring profile settings

10/13/2014 9:32:11 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Configuring profiles

By default, all three firewall profiles are enabled on Windows computers. You can change the state of any profile or configure its properties by right-clicking on the root node in the Windows Firewall with Advanced Security snap-in and selecting Properties. Doing this opens the Windows Firewall with Advanced Security properties shown in Figure 2.

Configuring the firewall profile settings.
Figure 2. Configuring the firewall profile settings.

You can use this properties dialog box to configure the following properties for the selected profile:

  • Firewall State You use this setting to enable or disable Windows Firewall with Advanced Security for the selected profile. Microsoft recommends that you always leave this set to On.

  • Inbound Connections You use this setting to configure how Windows Firewall with Advanced Security handles incoming traffic. These are the three available options:

    • Block Blocks all connections that do not have firewall rules that explicitly allow the connection.

    • Block All Connections Blocks all connections, regardless of any firewall rules that explicitly allow the connection.

    • Allow Allows the connection unless there is a firewall rule that explicitly blocks the connection.

    The default value for the inbound connections property is Block. This means that if an inbound rule for the profile explicitly allows a certain type of incoming traffic, any traffic matching that rule will be accepted by the host. But if a certain type of incoming traffic does not match any of the inbound rules for the profile, that type of traffic will not be accepted by the host.

  • Outbound Connections You use this setting to configure how Windows Firewall with Advanced Security handles outgoing traffic. The only two options available here are Block and Allow. The default setting for the Outbound Connections property is Allow, which means that all traffic leaving the host is allowed to pass through the firewall unless an explicit outbound rule prohibits this for a certain type of outgoing traffic.

  • Protected Network Connections This setting opens a dialog box you can use to specify which network connections should be protected by the rules associated with the selected profile. For example, on a multihomed computer with two network connections to different networks of type private, the dialog box for the private profile would display two check boxes. By default, both private networks would be protected by default, but by clearing the check boxes you can disable this protection for either or both networks.

The Settings and Logging options are described in the next two sections.

Configuring profile settings

Clicking Customize in the Settings section of a profile’s properties opens the dialog box shown in Figure 3, which you can use to specify other settings that control the behavior of Windows Firewall with Advanced Security. For example, you can do the following:

  • Specify whether Windows Firewall with Advanced Security should display a notification to the user when a program on the user’s computer is blocked from receiving inbound connections. When such a notification is displayed, the user can select an option that unblocks the program as long as the user has sufficient privileges (belongs to the local Administrators or Network Configuration Operators security group). When the user chooses to unblock a program, an inbound program rule for the program is automatically created on the user’s computer.

  • Allow unicast responses to multicast or broadcast requests to allow Windows Firewall with Advanced Security to wait several seconds for unicast responses from other computers to which the local computer has sent multicast or broadcast messages.

  • Rule merging allows users who are members of the local Administrators or Network Configuration Operators security group on the computer to create and apply local rules that are merged together with any rules being applied to the computer by Group Policy.

Configuring other settings for a firewall profile.
Figure 3. Configuring other settings for a firewall profile.
 
Others
 
- Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 2) - Managing firewall profiles
- Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 1) - Understanding Windows Firewall with Advanced Security
- Microsoft Exchange Server 2013 : Addressing Exchange - Hierarchical address book
- Microsoft Exchange Server 2013 : Addressing Exchange - The Offline Address Book (part 3) - Creating and using customized OABs
- Microsoft Exchange Server 2013 : Addressing Exchange - The Offline Address Book (part 2) - How Exchange 2013 generates the Offline Address Book
- Microsoft Exchange Server 2013 : Addressing Exchange - The Offline Address Book (part 1) - The OAB and Outlook
- Microsoft Exchange Server 2013 : Addressing Exchange - Address book policies - Creating and implementing an ABP
- Microsoft Exchange Server 2013 : Addressing Exchange - Address lists
- User Profiles in SharePoint 2013 (part 3) - A Custom Profile Property and Subtype in Action - Audiences
- User Profiles in SharePoint 2013 (part 2) - A Custom Profile Property and Subtype in Action - Organization Profiles
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us