From 7033ac7932f5c85d6002061c1f5b00aadeb47277 Mon Sep 17 00:00:00 2001 From: Benny Shilpa Date: Thu, 3 Dec 2020 12:05:46 +0530 Subject: [PATCH] Update firewall-settings-lost-on-upgrade.md --- .../firewall-settings-lost-on-upgrade.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index 92a3e08580..8948b3b3fe 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -1,6 +1,6 @@ --- -title: Firewall Settings Lost on Upgrade -description: Firewall Settings Lost on Upgrade +title: Firewall settings lost on upgrade +description: Firewall settings lost on upgrade ms.reviewer: ms.author: v-bshilpa ms.prod: w10 @@ -15,13 +15,13 @@ ms.collection: ms.topic: troubleshooting --- -# Firewall Settings Lost on Upgrade +# Firewall settings lost on upgrade -This article describes a scenario where previously enabled firewall rules revert to a disabled state after performing a Windows upgrade. +This article describes a scenario where previously enabled Firewall rules revert to a disabled state after performing a Windows upgrade. -## Rule Groups +## Rule groups -Individual built-in firewall rules are categorized within a group. For example, the following individual rules form part of the ‘Remote Desktop’ group. +Individual built-in Firewall rules are categorized within a group. For example, the following individual rules form part of the Remote Desktop group. - Remote Desktop – Shadow (TCP-In) @@ -29,7 +29,7 @@ Individual built-in firewall rules are categorized within a group. For example, - Remote Desktop – User-Mode (UDP-In) -Other examples include the Core Networking, File and Print Sharing, and Network Discovery groups. Admins can filter on individual categories in the firewall interface (wf.msc) by selecting and right-clicking on ‘**Inbound**’ or ‘**Outbound Rules**’ and selecting ‘**Filter by Group**’; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. +Other examples include the core networking, file and print sharing, and network discovery groups. Admins can filter on individual categories in the Firewall interface (wf.msc) by selecting and right-clicking on **Inbound** or **Outbound Rules** and selecting **Filter by Group**; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. ```Powershell Get-NetFirewallRule -Group