Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Vista

Configure Network Security (part 2 ) - Windows Firewall

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/18/2011 9:53:48 PM

Windows Firewall

One of the major complaints on Windows operating system security has always been the issue of a built-in firewall. With Windows XP Service Pack 1, a limited firewall was first implemented. Windows Vista now provides a more complete security configuration in the included firewall by allowing for control of outbound connection requests as well as inbound connection attempts.

Configuring the Windows Vista Firewall begins with the firewall profile selected when you set up the network location type. Figure 3 shows the three firewall profiles described earlier in the discussion of network profiles.

Figure 3. The Windows Firewall with Advanced Security displaying the firewall profiles.

Configuring firewall settings within the Windows Firewall with Advanced Security console involves setting granular controls for specific protocols and for inbound and outbound directions. You can access Windows Firewall with Advanced Security by clicking Start > Administrative Tools > Windows Firewall with Advanced Security.

Initially, you should configure the firewall profiles first to satisfy how Windows Firewall will function when a network location type is selected for any new connection. To access the properties of the firewall profiles, select the top node in the MMC on the left labeled Windows Firewall with Advanced Security on Local Computer. Right-click this item and select the Properties option from the menu. Figure 4 shows what is displayed after you follow these steps.

Figure 4. Configuring the properties of the Windows firewall profiles.


For each of the firewall profiles, you are able to configure the characteristics of the firewall state, Inbound and Outbound firewall functionality, settings that control notifications, Unicast response, whether rules are merged, and logging of firewall traffic for troubleshooting.

The firewall state refers to whether Windows Firewall is set to On for that particular firewall profile.

Inbound and Outbound connection settings can be configured to one of three settings:

  • Block— Blocks all connections that do not have firewall rules that explicitly allow the connection.

  • Block All Connections— Blocks all connections even if there is an explicit firewall rule that allows a connection. This applies to only inbound connections.

  • Allow— Allows all connections unless there is a firewall rule that explicitly blocks a particular connection.

There is a notification setting available when you customize the settings of a firewall profile. The notification settings determine whether a notification is sent to the local user if a program is blocked from receiving an inbound connection. The default setting for this is Yes.

A Unicast response setting determines whether a unicast response may be sent for multicast or broadcast traffic. This setting can help certain types of malicious attacks where multicast or broadcast traffic from a bad guy is used to illicit traffic, such as ICMP responses or requests from the local computer.

Rule merging settings are managed through Group Policy, but their outcome is displayed here. These settings determine whether the local firewall rules and local connection security rules merge with Group Policy settings that are applied to the local computer.

The settings for Logging configuration for the Windows Firewall allow the local administrator to log packets that are dropped as well as log successful connections.

Alert

Note that the name of the log file created by default for Windows Firewall logging is pfirewall.log. Because the firewall policy can be set to block outgoing as well as incoming connections, when logging dropped packets, you are able to log packets that are dropped by the local firewall when attempting an outbound connection as well. This capability aids in troubleshooting granular configuration of outbound rules that permit a particular protocol for an application. By reviewing the log when an application fails to make an outbound connection, you are then able to determine if all ports outbound as well as inbound for an application are configured appropriately.


Figure 5 shows configuration of the logging settings for Windows Firewall.

Figure 5. Configuring log settings for the Windows Firewall.


To view the contents of the log when it is in use, you can select the Monitoring node in the console screen of Windows Firewall with Advanced Security. In the right pane, you see a hyperlink to the log in use. Figure 6 shows how to access this log and view its contents.

Figure 6. Viewing the log contents of the Windows Firewall.

Alternatively, you can use Windows Explorer to access the firewall log found by default at C:\Windows\system32\Logfiles\Firewall\pfirewall.log. The log file must be stored in a directory where the Windows Firewall service account has Write permissions. Failure to ensure this permission assignment to that account prohibits the firewall service from logging to the pfirewall.log file.

Caution

Why Isn’t Anything Logged? The Windows Firewall service account is known more affectionately as NT Service\MpsSvc. When you are creating a custom location for this log file, ensure that the account NT Service\MpsSvc is assigned the Write NTFS permission to the folder where the log file is located. Support article 929455 describes this issue when the permission assignment has not been made and discusses the corresponding resolution.

Other -----------------
- Configure Network Security (part1 ) - Secure Files and Printer Shares with Access Control Lists (ACLs)
- Configure and Troubleshoot Remote Access (part 2) - Troubleshooting Windows Vista Remote Access Connections
- Configure and Troubleshoot Remote Access (part 1) - Remote Client Access Connections
- Configure and Troubleshoot Wireless Networking (part 3) - Troubleshooting Wireless Connections
- Configure and Troubleshoot Wireless Networking (part 2) - Wireless Security
- Configure and Troubleshoot Wireless Networking (part 1) - Managing Wireless Connectivity in the Enterprise
- Troubleshoot Resource Access and Connectivity Issues (part 2)
- Troubleshoot Resource Access and Connectivity Issues (part 1) - Troubleshooting TCP/IP Configuration
- Configure and Troubleshoot Network Services at the Client Level
- Configure and Troubleshoot Network Protocols (part 3) - Configuring TCP/IP Version 6
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server