programming4us
           
 
 
Windows

Windows Vista: Windows Firewall Settings - Advanced Configuration

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
1/2/2011 9:17:27 AM
The new Windows Firewall with Advanced Security is a Microsoft Management Console (MMC) snap-in that provides more advanced options for IT professionals. With this firewall, you can set up and view detailed inbound and outbound rules and integrate with IPSec. To access the Windows Firewall with Advanced Security, follow these steps:
 
1.
Open Administrative Tools by clicking the Start button, Control Panel, System and Maintenance, and then click Administrative Tools.

2.
Double-click Windows Firewall with Advanced Security. If you are prompted for an administrator password or confirmation, enter the password or provide confirmation.

Of course, you must be a member of the Administrators group or the Network Operators group to use Windows Firewall with Advanced Security.

The Windows Firewall with Advanced Security management console enables you to configure the following (see Figure 1):

  • Inbound rules. Windows Firewall will block all unsolicited incoming traffic unless allowed by a rule.

  • Outbound rules. Windows Firewall will allow all outbound traffic unless blocked by a rule.

  • Connection security rules. Forces two computers to authenticate to each other and to secure or encrypt data using IPSec.

  • Monitoring. Display information about current firewall rules, connection security rules, and security associations.

Figure 1. Windows Firewall with Advanced Security console.


You create inbound rules to control access to your computer from the network. Inbound rules can prevent the following:

  • Unwanted software being copied to your computer

  • Unknown or unsolicited access to data on your computer

  • Unwanted configuration of your computer

To configure advanced properties for a rule using the Windows Firewall with Advanced Security, follow these steps:

1.
Right-click the name of the inbound rule, and click Properties.

2.
From the Properties dialog box for an inbound rule, configure settings on the following tabs:

  • General. The rule’s name, the program to which the rule applies, and the rule’s action (allow all connections, allow only secure connections, or block).

  • Programs and Services. The programs or services to which the rule applies.

  • Users and Computers. If the rule allows only secure connections, you can specify which computer accounts are allowed to make the connection.

  • Protocols and Ports. The rule’s IP protocol, source and destination TCP or UDP ports, and ICMP or ICMPv6 settings.

  • Scope. The rule’s source and destination addresses.

  • Advanced. The profiles or types of interfaces to which the rule applies.

You can also use the Windows Firewall with Advanced Security to create outbound rules to control access to network resources from your computer. Outbound rules can prevent the following:

  • Programs including malware from accessing network resources without your knowledge

  • Programs including malware from downloading software without your knowledge

  • Users downloading software without your knowledge

Other -----------------
- Windows Vista: Windows Firewall Settings - Basic Configuration
- Windows 7: Troubleshooting Device Problems (part 3)
- Windows 7: Troubleshooting Device Problems (part 2) - Displaying a List of Nonworking Devices
- Windows 7: Troubleshooting Device Problems (part 1) - Troubleshooting with Device Manager
- Windows 7: Working with Device Security Policies
- Windows Vista : Configuring Network Security - Windows Defender
- Windows 7: Managing Your Hardware with Device Manager (part 4) - Writing a Complete List of Device Drivers to a Text File
- Windows 7: Managing Your Hardware with Device Manager (part 3) - Configuring Windows to Ignore Unsigned Device Drivers
- Windows 7: Managing Your Hardware with Device Manager (part 2) - Working with Device Drivers
- Windows 7: Managing Your Hardware with Device Manager (part 1)
- SOA with .NET and Windows Azure: WCF Extensions - WCF Transactions (part 2)
- SOA with .NET and Windows Azure: WCF Extensions - WCF Transactions (part 1)
- Windows 7: Recovering from a Problem
- Windows 7: Troubleshooting Tools (part 3) - Checking for Solutions to Problems
- Windows 7: Troubleshooting Tools (part 2) - Running the Memory Diagnostics Tool
- Windows 7: Troubleshooting Tools (part 1) - Running the Windows 7 Troubleshooters
- Windows Vista : User Account Control
- Windows 7 : Troubleshooting Strategies - Determining the Source of a Problem (part 3)
- Windows 7 : Troubleshooting Strategies - Determining the Source of a Problem (part 2)
- Windows 7 : Troubleshooting Strategies - Determining the Source of a Problem (part 1)
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us