This commit is contained in:
Paolo Matarazzo 2023-11-21 14:51:53 -05:00
parent 397f964c16
commit aabd947fff
3 changed files with 5 additions and 5 deletions

View File

@ -8007,7 +8007,7 @@
},
{
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md",
"redirect_url": "/windows/security/operating-system-security/network-security/configure-with-command-line",
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-with-command-line",
"redirect_document_id": false
},
{
@ -8017,7 +8017,7 @@
},
{
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/best-practices-configuring.md",
"redirect_url": "/windows/security/operating-system-security/network-security/configure",
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
"redirect_document_id": false
},
{

View File

@ -37,7 +37,7 @@ Windows Firewall offers several benefits to address your organization's network
The default behavior of Windows Firewall is to:
- block all incoming traffic, unless solicited or maching a *rule*
- block all incoming traffic, unless solicited or matching a *rule*
- allow all outgoing traffic, unless matching a *rule*
### Firewall rules

View File

@ -121,9 +121,9 @@ An important Windows Firewall feature you can use to mitigate damage during an a
Shields up can be achieved by checking **Block all incoming connections, including those in the list of allowed apps** setting found in either the Windows Settings app or Control Panel.
![Incoming connections.](images/fw06-block.png)
:::image type="content" alt-text="Screenshot of the Windows Security app showing incoming connections." source="images/fw06-block.png":::
:::image type="content" alt-text="Firewall cpl." source="images/fw07-legacy.png":::
:::image type="content" alt-text="Screenshot of the Control Panel Firewall applet." source="images/fw07-legacy.png":::
By default, the Windows Firewall blocks everything unless there's an exception rule created. The *shield up* option overrides the exceptions. For example, the Remote Desktop feature automatically creates firewall rules when enabled. However, if there's an active exploit using multiple ports and services on a host, you can, instead of disabling individual rules, use the shields up mode to block all inbound connections, overriding previous exceptions, including the rules for Remote Desktop. The Remote Desktop rules remain intact but remote access can't work as long as shields up is active.