programming4us
           
 
 
Windows

Windows 7 : Managing Windows Firewall (part 2)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/8/2010 11:43:28 AM
Adding a Program as a New Exception

If you don’t see the program or port you want to work with, you can add it by hand. Here’s how:

1.
Select Start, type firewall, and then click Allow a Program Through Windows Firewall in the search results. The Allowed Programs window appears.

2.
Click Change Settings. Windows Firewall enables the exceptions.

3.
Click Allow Another Program. The Add a Program dialog box appears.

4.
If you see your program in the list, click it. Otherwise, click Browse, use the Browse dialog box to select the program’s executable file, and then click Open.

5.
Click Add. Windows Firewall adds the program to the list.

6.
Activate the Home/Work (Private) check box.

7.
If you also connect to public networks (such as wireless hot spots) and you want the program allowed through on those networks, activate the Public check box.

8.
Click OK to put the exception into effect.

Tip

You can prevent computers on your network from adding program exceptions if you’re worried about security. On the other computer, log on as an administrator, open the Group Policy Editor , and open the following branch: Computer Configuration, Administrative Templates, Network, Network Connections, Windows Firewall, Standard Profile. Enable the Windows Firewall: Do Not Allow Exceptions policy and the Windows Firewall: Protect All Network Connections policies.


Adding a Port as a New Exception

If you need to open a port on your computer, you can’t do it via the Allowed Programs windows. Instead, you need to work with a Microsoft Management Console snap-in called Windows Firewall with Advanced Security (WFAS). To load it, select Start, wf.msc, and then press Enter User Account Control credentials. Figure 3 shows the WFAS snap-in.

Figure 3. The Windows Firewall with Advanced Security snap-in offers sophisticated firewall-management features.


The home page of the snap-in presents an overview of the current firewall settings, as well as a number of links to configure and learn about WFAS. This snap-in configures the firewall by setting policies and storing them in three profiles. The domain profile is used when your computer is connected to a network domain, the private profile is used when your computer is connected to a private network, and the public profile is used when your computer is connected to a public network. To change the settings for the profiles, click the Windows Firewall Properties link, and then use the Domain Profile, Private Profile, and Public Profile tabs to modify the settings (although the defaults should be fine for most people).

The scope pane contains four main sub-branches:

  • Inbound Rules— This branch presents a list of defined rules for inbound connections. In most cases, the rules aren’t enabled. To enable a rule, you right-click it and then click Enable Rule (or you can click the rule and then click Enable Rule in the Action pane). You can create your own rule (as you’ll soon see) by right-clicking Inbound Rules and then clicking New Rule (or clicking New Rule in the Action pane). This launches the New Inbound Rule Wizard.

  • Outbound Rules— This branch presents a list of defined rules for outbound connections. As with inbound connections, you can enable the rules you want to use and create your own rules. Note, too, that you can customize any rule by double-clicking it to display its property sheet. With this property sheet, you can change the program executable to which the exception is applied, allow or block a connection, set the computer and user authorization, change the ports and protocols, and specify the interface types and services.

  • Connection Security Rules— This branch is where you create and manage authentication rules, which determine the restrictions and requirements that apply to connections with remote computers. Right-click Computer Connection Security and then click New Rule (or click New Rule in the Action pane) to launch the New Connection Security Rule Wizard.

  • Monitoring— This branch shows the enabled firewall settings. For example, the Firewall sub-branch shows the enabled inbound and outbound firewall rules, and the Connection Security Rules sub-branch shows the enabled authentication rules.

Here are the steps to follow to use WFAS to create a port exception:

1.
Click Inbound Rules.

2.
In the Actions pane, click New Rule to launch the New Inbound Rule Wizard.

3.
Click Port and then click Next. The Protocol and Ports dialog box appears.

4.
Click the data protocol you want the exception to use: TCP or UDP. (If you’re not sure, choose TCP.)

5.
Activate the Specific Local Ports option and use the text box to type the port you want to set up as an exception.

6.
Click Next. The Action dialog box appears.

7.
Click Allow the Connection and then click Next. The Profile dialog box appears.

8.
Activate the check box beside each profile you use (Domain, Private, or Public), and then click Next. The Name dialog box appears.

9.
Use the Name text box to make up a name for this exception. This is the name that appears in the Exceptions tab, so make it reasonably descriptive (for example, Port 80 for Web Server).

10.
Click Finish to put the exception into effect.

Tip

If you’re worried about someone on your network adding a port as an exception and possibly opening up a security hole (for example, by forgetting to change the scope to something local), you can disable new port exceptions on that computer. Log on as an administrator, open the Group Policy Editor, and open the following branch: Computer Configuration, Administrative Templates, Network, Network Connections, Windows Firewall, Standard Profile. Disable the Windows Firewall: Allow Local Port Exceptions policy.

Other -----------------
- Windows 7 : Checking Your Computer’s Security Settings (part 2)
- Windows 7 : Checking Your Computer’s Security Settings (part 1)
- Securing Windows 7 : Thwarting Snoops and Crackers (part 2) - Locking Your Computer Manually, Automatically
- Securing Windows 7 : Thwarting Snoops and Crackers (part 1) - First, Some Basic Precautions
- Windows 7 : Working with the Command-Line Tools (part 3) - Working with System Management Tools
- Windows 7 : Working with the Command-Line Tools (part 2) - Working with File and Folder Management Tools
- Windows 7 : Working with the Command-Line Tools (part 1) - Working with Disk Management Tools
- SOA with .NET and Windows Azure : System.Transactions
- Windows 7 : Understanding Batch File Basics (part 2) - Using Batch File Parameters
- Windows 7 : Understanding Batch File Basics (part 1) - Creating Batch Files
- Discovering the Microsoft Azure Platform
- SOA with .NET and Windows Azure : Microsoft Messaging Queue (MSMQ)
- Windows 7 : Working at the Command Line (part 3)
- Windows 7 : Working at the Command Line (part 2)
- Windows 7 : Working at the Command Line (part 1)
- Windows 7 : Getting to the Command Line (part 2) - Running CMD
- Windows 7 : Getting to the Command Line (part 1)
- Windows Azure : Programming Access Control Service (part 10) - Deploying the Web Service in Windows Azure
- Windows Azure : Programming Access Control Service (part 9) - Configuring a Web Service Client to Acquire and Send SAML Tokens
- Windows Azure : Programming Access Control Service (part 8)
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us