[Firewall]How to configure firewall rules in windows

You will learn how to create inbound and outbound rules in windows firewall

Why you need to know

Firewall rules are created to put restriction on sending traffic to, or receiving traffic from, programs, systems services or users. Configuring inbound and outbound traffic rule on firewall is one of the important tasks in network security. These rules are configured based on the org policy. It prevents malicious traffic from entering into the network.

Network topology

Demo

1:login windows 10 client

2: Click windows icon and type remote desktop

3:type 10.0.0.101 and connect. Then type your credential.

4: you can see now we can use remote desktop connection

5: Go to Control Panel > Window firewall > Advanced settings

6:Outbound rules

There are three levels here

  • Domain: Applies to the network Adapter, when the device is part of a Domain
  • Private: Applies to a network adapter when the device is connected to Network indirectly via a router or some other security
  • Public: Applies to a network adapter when the device is directly connected to a Network.

7:New rule

8: choose port

9:Choose TCP and type port 3389

10:Block the connection

11: Choose all

12: Type name and finish

13: you can see the firewall setup correctly.

14: open remote desktop again and type 10.0.0.101

15: You see the failed message because of the new firewall configuration settings.

Conclusion

You learned how to create firewall rules in Windows

--

--

--

Security Analyst(Full-time), Cloud security engineer(internship). https://www.linkedin.com/in/takahiro-oda-881423197/

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How a Burner Email Protects Your Inbox, Phone, and Cards

Best VPN for Your Cat 2019

A VPN is not expected to be on the Oculus Quest.

AWS re:invent 2020 Security announcements Recap of Week 1 — including updates that were not called…

Send Fake Emails To Yourself Using A Temporary Email

Low-cost Tools For Temporary Email Addresses

Step By Step On How To Use Disposable Emails For Free

DeepBlueCLI — a PowerShell Module for Threat Hunting via Windows Event Logs

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Takahiro Oda

Takahiro Oda

Security Analyst(Full-time), Cloud security engineer(internship). https://www.linkedin.com/in/takahiro-oda-881423197/

More from Medium

[project]How to hack a password with Kali Linux and countermeasures

Step-By-Step Procedure To Install Raspberry Pi OS On VMWare Workstation

Hack The Box: Fawn

Ansible troubleshooting — Windows 11 Error 0x80370102 WSL: Windows Subsystem for Linux