In this tutorial, we will see how to add rules to the Windows Firewall using Group Policy.
For information, the Windows Firewall has been implemented in the Windows operating system with service pack 2 (SP2) of Windows XP. It is now part of the system and some functionality like DirectAccess requires that it be enabled to work.
In many organizations, system administrators tend to disable the GPO firewall to prevent application blocking.
What I propose to see in this tutorial is to create a policy that will allow all traffic on the domain profile instead of disabling the firewall.
This type of rule remains dangerous, it is advisable to allow only legitimate traffic on your network
By default, the Windows firewall passes all outgoing connections unless a blocking rule is configured. Normally only the rules of incoming traffic are to be configured (RDP, VNC …)
Configuring Group Policy (GPO)
From the Group Policy Management console, right-click at the location where the policy is to be applied and click Create GPO in this domain and link it here 1 .
If necessary do the same for outgoing traffic. By default, outbound traffic is not blocked.
In an environment where an Active Directory domain, the Windows Firewall configuration can be done by group policies and making its administration easy.
Now that you know how to create a rule, I invite you to re-enable the firewall on computers to regain control.
If a day needs to block a port on the entire park a rule in a group policy and it’s done.