![]() |
Setting up advance firewall: Intelligent Computing [Image: pcclean.com.au ] |
Firewall
is actually a set of protocol that decides how an application or say port will
be working from external network including internet, intranet and extranet. For
making use in every organization is extremely important for security reasons.
If
you are a home user and don’t have such network, don’t ignore but ahead I’ll
tell you how you can be affected by the loose control on your firewall. Okay
let me tell you all the worms and root kits that are sent to our computer for
stealing the information, uses the specific port number to communicating to the
attackers for sending the confidential and critical data to them. By
configuring your Windows Firewall with little effort, you can save lots
potential harm to your PC.
Windows
firewall setting located in
Control Panel >>Administrative Tools
>> Windows Firewall with Advanced Security
|
Or you can quickly go to
there by using Run
Shortcuts
Run >> ‘Firewall.cpl’ [Enter]
And Selecting Advance option
from left plane.
Understanding Windows Firewall
On the Top left corner of
the Advance firewall window, you will notice mainly four options.
Inbound
Rules
The
Rules listed in your Firewall setting that decide which outer source will be
allowed/deny the incoming connection via a port or to a specific application.
Outbound
Rules
Outbound
Rules build up the protocol which decides which application from the Windows
will communicate from the internet via any know/unknown port.
Connection
Security rules
This
section contains the security related rules listed inside this section.
Monitoring
Here
in this section, you can monitor the incoming and outgoing connection status.
Setting Up advance Firewall
Here in this section, I will
tell you how you can configure the connection protocol for any specific application;
this will have two sub section, inbound configuration and outbound
configuration.
Setting inbound/Outbound Configuration
Let’s start quickly.
Click on the Inbound Rules from Left plane,
You will see the list of Rules set to the incoming
connection. You can Double click on the any rule to view the complete
description on the rule.
If you want to want to set up the New Rule on the
incoming connection, move your mouse on the right side information panel, Click
on New Rule
This will open the New Wizard for setting up the Rules,
You will find the four options there,
* Program /* for configuring the connection for specific
program */
-If you selected the Program, redirect the path of the
program and proceed,
* Port /* Specify the TCP/UDP port for configuring */
- In case you selected the Port, Enter the Port number.
Multiple port number can be entered by comma separated value or Range of the
ports first port-last port
* Predefined /* Let you select the windows predefined
applications */
- Selecting the Predefined program will let you select
the sub part of the program to select
* Costume /* Let you customize the option (Expert only)
*/
- In case costume you have to select the executable
application path
Select the One and Proceed by clicking
At the next step you will get the three options out
there.
Allow the connection.
- This
let you allow connection to the internet via any selected port
Allow the connection if it is secure
- This
will allow connection only it is secure and encrypted.
Or
Block the connection
- This
will simply block all the incoming and outgoing connection from the
outside network
Now click Next..
Now you will get the option asking you to check the
checkbox having options when to apply the Rule you have created.
If you are in corporate domain and want to apply the rule
check the Domain
If the network domain is private, select the private.
Or select the public for public location
Click on Next
After this you will get the option to Name this new rule
and add the description for the other user (like if you are one of group of
administrator) and save the Rule. After this your rule will be applied to the
computer.
Why to apply these Rules
To prevent unwanted incoming connection to connect any
application to internet, that may secretly share your data to person behind.
Prevent updating of software automatically.
Blocking the rootkits, worms to harm your computer.
Hoping this information will help you to make your
computer more secure and safe.
Subscribe Author for Updates
No comments :
Post a Comment