mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
updates
This commit is contained in:
parent
e4a12e020d
commit
69de2d06be
@ -7962,32 +7962,32 @@
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-inbound-rules-to-support-rpc.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-rules-with-gpo",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-program-or-service-rule.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-rules-with-gpo",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-port-rule.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-rules-with-gpo",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-program-or-service-rule.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-rules-with-gpo",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-port-rule.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-rules-with-gpo",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-icmp-rule.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-rules-with-gpo",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
@ -8034,6 +8034,11 @@
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-windows-firewall-rules-in-intune.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/firewall-settings-lost-on-upgrade.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall",
|
||||
"redirect_document_id": false
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
title: Configure Windows Firewall logging
|
||||
description: Learn how to configure Windows Firewall to log dropped packets or successful connections with CSP and group policy.
|
||||
ms.topic: how-to
|
||||
ms.date: 11/14/2023
|
||||
ms.date: 11/21/2023
|
||||
---
|
||||
|
||||
# Configure Windows Firewall logging
|
||||
@ -75,7 +75,7 @@ Alternatively, you can configure devices using a [custom policy][INT-1] with the
|
||||
Here are some recommendations for configuring Windows Firewall logging:
|
||||
|
||||
- Change the logging size to at least **20,480 KB (20 MB)** to ensure that the log file doesn't fill up too quickly. The maximum log size is 32,768 KB (32 MB)
|
||||
- For each profile (Domain, Private, and Public) change the name from `%windir%\system32\logfiles\firewall\pfirewall.log` to:
|
||||
- For each profile (Domain, Private, and Public) change the default log file name from `%windir%\system32\logfiles\firewall\pfirewall.log` to:
|
||||
- `%windir%\system32\logfiles\firewall\pfirewall_Domain.log`
|
||||
- `%windir%\system32\logfiles\firewall\pfirewall_Private.log`
|
||||
- `%windir%\system32\logfiles\firewall\pfirewall_Public.log`
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Manage Windows Firewall with the command line
|
||||
description: Learn how to manage Windows Firewall from the command line. This guide provides examples how to manage Windows Firewall with PowerShell and Netsh.
|
||||
ms.topic: conceptual
|
||||
ms.date: 11/20/2023
|
||||
ms.date: 11/21/2023
|
||||
---
|
||||
|
||||
# Manage Windows Firewall with the command line
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Configure firewall rules with group policy
|
||||
description: Learn how to configure firewall rules using group policy with the Windows Firewall with Advanced Security console.
|
||||
ms.topic: how-to
|
||||
ms.date: 11/14/2023
|
||||
ms.date: 11/21/2023
|
||||
---
|
||||
|
||||
# Configure rules with group policy
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Filter origin audit log improvements
|
||||
description: Filter origin documentation audit log improvements
|
||||
ms.topic: troubleshooting
|
||||
ms.date: 11/07/2023
|
||||
ms.date: 11/21/2023
|
||||
---
|
||||
|
||||
# Filter origin audit log improvements
|
||||
|
@ -1,31 +0,0 @@
|
||||
---
|
||||
title: Troubleshooting Windows Firewall settings after a Windows upgrade
|
||||
description: Firewall settings lost on upgrade
|
||||
ms.topic: troubleshooting
|
||||
ms.date: 11/07/2023
|
||||
---
|
||||
|
||||
# Troubleshooting Windows Firewall settings after a Windows upgrade
|
||||
|
||||
Use this article to troubleshoot firewall settings that are turned off after upgrading to a new version of Windows.
|
||||
|
||||
## Rule groups
|
||||
|
||||
To help you organize your list, individual built-in firewall rules are categorized within a group. For example, the following rules form part of the Remote Desktop group.
|
||||
|
||||
- Remote Desktop - Shadow (TCP-In)
|
||||
- Remote Desktop - User Mode (TCP-In)
|
||||
- Remote Desktop - User-Mode (UDP-In)
|
||||
|
||||
Other group examples include **core networking**, **file and print sharing**, and **network discovery**. Grouping allows administrators to manage sets of similar rules by filtering on categories in the firewall interface (wf.msc). Do this filtering by right-clicking on either **Inbound** or **Outbound Rules** and selecting **Filter by Group**. Optionally, you can use PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch.
|
||||
|
||||
```Powershell
|
||||
Get-NetFirewallRule -Group <groupName>
|
||||
```
|
||||
|
||||
> [!NOTE]
|
||||
> Microsoft recommends to enable or disable an entire group instead of individual rules.
|
||||
|
||||
Microsoft recommends that you enable/disable all of the rules within a group instead of one or two individual rules. This recommendation is because groups aren't only used to organize rules and allow batch rule modification by type, but they also represent a 'unit' by which rule state is maintained across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the update process determines what should be enabled/disabled when the upgrade is complete.
|
||||
|
||||
For example, the Remote Desktop group consists of three rules. To ensure that the rule set is properly migrated during an upgrade, all three rules must be enabled. If only one rule is enabled, the upgrade process will see that two of three rules are disabled and then disable the entire group to maintain a clean, out-of-the-box configuration. This scenario has the unintended consequence of breaking Remote Desktop Protocol (RDP) connectivity to the host.
|
@ -2,7 +2,7 @@
|
||||
title: Hyper-V firewall
|
||||
description: Learn how to configure Hyper-V firewall rules and settings using PowerShell or Configuration Service Provider (CSP).
|
||||
ms.topic: how-to
|
||||
ms.date: 11/08/2023
|
||||
ms.date: 11/21/2023
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||
---
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Windows Firewall overview
|
||||
description: Learn overview information about the Windows Firewall security feature.
|
||||
ms.topic: conceptual
|
||||
ms.date: 11/20/2023
|
||||
ms.date: 11/21/2023
|
||||
---
|
||||
|
||||
# Windows Firewall overview
|
||||
|
@ -1,8 +1,8 @@
|
||||
---
|
||||
title: Quarantine behavior
|
||||
description: Learn about Windows Firewall and the quarantine feature behavior.
|
||||
ms.topic: conceptual
|
||||
ms.date: 11/14/2023
|
||||
ms.topic: concept-article
|
||||
ms.date: 11/21/2023
|
||||
---
|
||||
|
||||
# Quarantine behavior
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Windows Firewall rules
|
||||
description: Learn about Windows Firewall rules and design recommendations.
|
||||
ms.date: 11/15/2023
|
||||
ms.date: 11/21/2023
|
||||
ms.topic: concept-article
|
||||
---
|
||||
|
||||
|
@ -25,5 +25,3 @@ items:
|
||||
href: filter-origin-documentation.md
|
||||
- name: Quarantine behavior
|
||||
href: quarantine.md
|
||||
- name: Firewall settings lost on upgrade
|
||||
href: firewall-settings-lost-on-upgrade.md
|
@ -136,7 +136,7 @@ From the following dropdown, select one of tools to learn how to configure Windo
|
||||
> [!div class="op_single_selector"]
|
||||
>
|
||||
> - [Configure with Microsoft Intune 🔗][INT-1]
|
||||
> - [Configure with GPO](configure.md)
|
||||
> - [Configure with group policy](configure.md)
|
||||
> - [Configure with command line tools](configure-with-command-line.md)
|
||||
|
||||
<!--links-->
|
||||
|
Loading…
x
Reference in New Issue
Block a user