Question

In: Computer Science

Configuring Windows Firewall In this project, you edit configuration settings on Windows Firewall. Note Windows Firewall...

Configuring Windows Firewall

In this project, you edit configuration settings on Windows Firewall.

Note

Windows Firewall uses three different profiles: domain (when the computer is connected to a Windows domain), private (when connected to a private network, such as a work or home network), and public (used when connected to a public network, such as a public Wi-Fi). A computer may use multiple profiles, so that a business laptop computer may use the domain profile at work, the private profile when connected to the home network, and the public profile when connected to a public Wi-Fi network. Windows asks whether a network is public or private when you first connect to it.

  1. 1

    Click Start, click the search icon, and enter Firewall.

  2. 2

    Click Windows Firewall Control panel.

  3. 3

    Click Turn Windows Firewall on or off. Be sure that the Windows Firewall is turned on for both private and public networks.

  4. 4

    Under Public network settings check Block all incoming connections, including those in the list of allowed apps. This provides an extra level of security when using a public network such as a free Wi-Fi network by preventing a malicious incoming connection from another computer on the network. Click OK.

  5. 5

    To allow an inbound connection from an installed application, in the left pane click Allow an app or feature through Windows Firewall.

  6. 6

    Each program or feature of Windows can be chosen to allow an incoming connection on public or private networks. Click Allow another app.

  7. 7

    From here you can select an app that will permit an incoming connection. Because this is a security risk, click Cancel and then OK.

  8. 8

    Now check the configuration properties of Windows Firewall. Click Advanced settings.

  9. 9

    Click Properties in the right pane.

  10. 10

    Note the settings on each of the profiles by clicking the Domain Profile, Private Profile, and Public Profile tabs. Is there any difference in the settings between these profiles? Why?

  11. 11

    On each tab under Settings, click Customize. Be sure that Display a notification is set to Yes. Why would this be important?

  12. 12

    Click OK to return to the Windows Firewall with Advanced Security page.

  13. 13

    In addition to being application-aware, Windows Firewall also can be configured for firewall rules. Click Outbound Rules in the left pane to block a program from reaching the Internet.

  14. 14

    In the right pane, click New Rule.

  15. 15

    Click Port and then click Next.

    Note

    In addition to ports, the Windows Firewall also can block by program (Program) or even by program, port, and IP address (Custom).

  16. 16

    If necessary, click TCP.

  17. 17

    Next to Specific remote ports: enter 80. Click Next.

  18. 18

    If necessary, click Block the connection. Click Next.

  19. 19

    Be sure that this new rule applies to all three domains. Click Next.

  20. 20

    Under Name: enter Blocking Port 80. Click Finish.

  21. 21

    Now open a web browser and try to connect to the Internet. What happens?

  22. 22

    Click the Back button to return to the Windows Firewall screen and click Action and Restore Default Policy to disable this rule. If a warning dialog box appears, click Yes. Click OK.

  23. 23

    Select Outbound Rules in the left pane. In the right pane, click New Rule.

  24. 24

    Click Custom and Next.

  25. 25

    If necessary, click All programs and Next.

  26. 26

    Note that you can configure a firewall rule based on protocol, protocol number, local port, and remote port.

  27. 27

    Click Cancel.

  28. 28

    Close all windows.

  29. please answer all the questions, and take screenshots of all the steps

Solutions

Expert Solution

As per the following question we have to configure the windows firewall.

Question:-

1

Click Start, click the search icon, and enter Firewall.

2

Click Windows Firewall Control panel.

3

Click Turn Windows Firewall on or off. Be sure that the Windows Firewall is turned on for both private and public networks.

4

Under Public network settings check Block all incoming connections, including those in the list of allowed apps. This provides an extra level of security when using a public network such as a free Wi-Fi network by preventing a malicious incoming connection from another computer on the network. Click OK.

5

To allow an inbound connection from an installed application, in the left pane click Allow an app or feature through Windows Firewall.

6

Each program or feature of Windows can be chosen to allow an incoming connection on public or private networks. Click Allow another app.

7

From here you can select an app that will permit an incoming connection. Because this is a security risk, click Cancel and then OK.

8

Now check the configuration properties of Windows Firewall. Click Advanced settings.

9

Click Properties in the right pane.

10

Note the settings on each of the profiles by clicking the Domain Profile, Private Profile, and Public Profile tabs. Is there any difference in the settings between these profiles? Why?

11

On each tab under Settings, click Customize. Be sure that Display a notification is set to Yes. Why would this be important?

12

Click OK to return to the Windows Firewall with Advanced Security page.

13

In addition to being application-aware, Windows Firewall also can be configured for firewall rules. Click Outbound Rules in the left pane to block a program from reaching the Internet.

14

In the right pane, click New Rule.

15

Click Port and then click Next.

Note

In addition to ports, the Windows Firewall also can block by program (Program) or even by program, port, and IP address (Custom).

16

If necessary, click TCP.

17

Next to Specific remote ports: enter 80. Click Next.

18

If necessary, click Block the connection. Click Next.

19

Be sure that this new rule applies to all three domains. Click Next.

20

Under Name: enter Blocking Port 80. Click Finish.

21

Now open a web browser and try to connect to the Internet. What happens?

22

Click the Back button to return to the Windows Firewall screen and click Action and Restore Default Policy to disable this rule. If a warning dialog box appears, click Yes. Click OK.

23

Select Outbound Rules in the left pane. In the right pane, click New Rule.

24

Click Custom and Next.

25

If necessary, click All programs and Next.

26

Note that you can configure a firewall rule based on protocol, protocol number, local port, and remote port.

27

Click Cancel.

28

Close all windows.

For the following steps to cover I have uploaded all the screenshots of implementation of all the steps in my windows system, do refer all the screenshots.

As well as I am giving you proper description of the screenshot within the image.

Steps:-

1)

2)

3)

4)

5)

6)

7)

8)

9)

10)

11)

There are 3 profiles:

They basically have same settings with slight difference that the inbound and outbound connections are bit different public and domain.

In public the inbound have block all connections setting while domain they have not same setting as it is showing in the screenshots.

12)

13)

14)

15)

16)

17)

18)

19)

20)

Here we have configration as protected type, protected number and various local ports change setting as well as remote ports.

21)

22)

As by following all the steps we can understand all firewall config in deep knowlage.


Related Solutions

discuss Configuring Roles for High Availability. Include the cluster aware roles in Windows Server and configuring...
discuss Configuring Roles for High Availability. Include the cluster aware roles in Windows Server and configuring Continuously Available Shares and Scale-out File Server (SoFS). list two reference
Research the Windows PowerShell commands for manipulating the firewall and construct a command that lists all...
Research the Windows PowerShell commands for manipulating the firewall and construct a command that lists all the firewall rules on a system with the output containing the information and headers below: Rule name TCP port Enabled
What command(s) do you use to view or edit the Windows registry? What precautions do you...
What command(s) do you use to view or edit the Windows registry? What precautions do you need to take when using it?
Ann is creating a template for the configuration of Windows servers in her organization.
7. Ann is creating a template for the configuration of Windows servers in her organization. It includes the basic security settings that should apply to all systems What type of document should she create? A. Baseline B. Policy C. Guideline D. Procedure 8. Aditya is attempting to classify information regarding a new project that hi organization will undertake in secret. Which characteristic is NOT normally used to make these type of classification decisions? A. Value B. Sensitivity C. Criticatity D. Threat 9. Marguerite is...
Windows Server 2016 - Configuring Advanced Storage Solutions - Discuss how the implementation of advanced storage...
Windows Server 2016 - Configuring Advanced Storage Solutions - Discuss how the implementation of advanced storage technology, such as that which is found in Windows Server 2016, may eliminate or reduce the need for larger storage hardware such as a SAN. Discuss the differences between Storage Replica and Data Deduplication. How are they complementary? How might they generate conflicting output?
Note Hydrogen's configuration 1s2 will appear as 1s2
Match the element to the electron configurationNote Hydrogen's configuration 1s2 will appear as 1s2 [Ne] 3s2 3p5 [Ne]3s2 3p3[Ar] 482 3d1[Kr] 5s2
QUESTION 1 When analyzing EIGRP configuration, you find two adjacent routers with the following settings:             GW1:...
QUESTION 1 When analyzing EIGRP configuration, you find two adjacent routers with the following settings:             GW1: router eigrp 65500 network 172.16.100.0 0.0.0.3 (rest of settings are omitted) GW2: router eigrp 65505 network 172.16.100.0 0.0.0.3 (rest of settings are omitted)     Can these two routers form EIGRP neighbor relationship?     True False 2 points    QUESTION 2 _______ is  the determining factor used by a routing algorithm to decide which route to a network is better than another. ASN AD Metric Router ID...
This week you have researched configuration management tools. As a project manager, what configuration management tool...
This week you have researched configuration management tools. As a project manager, what configuration management tool would you recommend using, and why?
Project Description In this project you will build a car configuration application in six units. Each...
Project Description In this project you will build a car configuration application in six units. Each unit provides learning opportunities in Object Oriented Design. You are expected to document these lessons and apply them in the next unit. You will notice that the design guidance will taper off as you progress through units in Project 1. You will be expected to design on your own. Project 1 - Unit 1 In this project you will build a Car Configuration Application...
Project Description In this project you will build a car configuration application in six units. Each...
Project Description In this project you will build a car configuration application in six units. Each unit provides learning opportunities in Object Oriented Design. You are expected to document these lessons and apply them in the next unit. You will notice that the design guidance will taper off as you progress through units in Project 1. You will be expected to design on your own. Project 1 - Unit 1 In this project you will build a Car Configuration Application...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT