GPO: Managing Windows Firewall Rules

Presentation

In this tutorial, we will see how to add rules to the Windows Firewall using Group Policy.

For information, the Windows Firewall has been implemented in the Windows operating system with service pack 2 (SP2) of Windows XP. It is now part of the system and some functionality like DirectAccess requires that it be enabled to work.

In many organizations, system administrators tend to disable the GPO firewall to prevent application blocking.

What I propose to see in this tutorial is to create a policy that will allow all traffic on the domain profile instead of disabling the firewall.

Configuring Group Policy (GPO)

From the Group Policy Management console, right-click at the location where the policy is to be applied and click Create GPO in this domain and link it here 1 .

Nommer la stratégie 1 et cliquer sur OK 2.
name the strategy

Right click on the 1 strategy and click on Edit 2 .
Edit strategy

In the Group Policy Editor, go to the following location: Computer Configuration / Policies / Windows Settings / Security Settings / Windows Firewall with Advanced Security Features.
Strategy editor

Right-click on Incoming Traffic Rule 1 then click on New rule 2 .
Add in rule

Choose the Custom rule type 1 and click Next 2 .
Select rule type

Select All Programs 1 then click Next 2 .
All programs

Protocol type, choose All 1 and click Next 2 .
Allow all protocol

Scope configuration, choose Any IP address 1 and click Next 2 .
Scope

Configure the action of the rule, choose Allow connection 1 then click on Next 2 .
Select action

Select the profile, here to limit the risks the rule will only be applied if the computer is connected to the domain of the company, choose Domain 1 and click Next 2 .
Choose profil

Name 1 the rule and click Finish 2 .
Name rule

The rule has been added to the policy.
firewall rule added

If necessary do the same for outgoing traffic. By default, outbound traffic is not blocked.

Go to a computer in the domain where the policy applies, if necessary make a gpupdate and check that the rule is present in the rules of incoming traffic.
Client rule

Conclusion

In an environment where an Active Directory domain, the Windows Firewall configuration can be done by group policies and making its administration easy.

Now that you know how to create a rule, I invite you to re-enable the firewall on computers to regain control.

If a day needs to block a port on the entire park a rule in a group policy and it’s done.


How useful was this post?

Click on a star to rate it!

Average rating / 5. Vote count:

We are sorry that this post was not useful for you!

Let us improve this post!



Related Posts


VPN Server with Windows Server: Installation and Configuration
In this tutorial, I will explain how to set up a VPN server on Windows Server with the role of remote access and configure access with NPS. When setting up a VPN server with Windows, 3 types of VPN service are installed: PPTP L2TP SSTP In this tutori

DirectAccess – Installation – Configuration in Windows Server 2016/2019
DirectAccess is a feature available with the Remote Access role, which allows you to set up an automatic connection solution to the corporate network for mobile computers or for small remote sites. Unlike a VPN, the connection is initiated directly b

Active Directory: Multi Site, Subnet, and Replication Configuration
Presentation In this tutorial, we will approach the notions of Active Directory sites as well as subnets. Active Directory sites can optimize management in multi-site / network infrastructures by: Management of replication between domain controllers.

Leave a Comment