Skip to main content

Firewall Rule Management (Windows)

Updated over a week ago

The Firewall Rule Management feature allows you to centrally configure custom inbound and outbound rules in the Windows Firewall, ensuring greater control over the network traffic of managed devices.

Prerequisites

  • Windows 10 and Windows 11.

  • Agent Version 1.10.27+

Use Cases

  1. Blocking unauthorized ports: Companies can block ports used by non-corporate applications, reducing security risks and preventing misuse of the network.

  2. Controlling inter-departmental communication: Allows for the creation of specific rules to only release the necessary connections between different areas (e.g., Finance and HR).

  3. Environments with shared devices: Ideal for institutions that need to limit the access of certain devices to internal servers, preventing unauthorized external connections.

  4. Compliance and auditing: Makes it easier to meet internal security policies, standards such as ISO 27001 and LGPD (General Data Protection Law), ensuring that only authorized communications occur on the endpoints.

How it works

Go to Windows > Settings > Firewall.

The Firewall management feature allows you to create custom rules to control network connections on Windows devices. In practical terms, you can:

  1. Block or Allow Connections: Define whether the rule should allow (permit traffic) or block (prevent traffic) the connection.

  2. Traffic Direction: Specify if the rule applies to:

    1. Inbound: Connections arriving at the device.

    2. Outbound: Connections that the device attempts to initiate externally.

  3. Protocol: Choose the type of network protocol that will be affected by the rule:

    1. TCP (Transmission Control Protocol): Used for most web data transfers, email, etc.

    2. UDP (User Datagram Protocol): Used for streaming, gaming, and other time-sensitive applications.

  4. Port Definition: Control is managed through communication ports. You can:

    1. Block/Allow all ports.

    2. Block/Allow a single specific port (example: port 80).

    3. Block/Allow a range of ports (example: ports 1000 to 2000).

  5. You can name each rule and add a description for easier identification and future management.

Did this answer your question?