|Setting up advance firewall: Intelligent Computing [Image: pcclean.com.au ]|
Firewall is actually a set of protocol that decides how an application or say port will be working from external network including internet, intranet and extranet. For making use in every organization is extremely important for security reasons.
If you are a home user and don’t have such network, don’t ignore but ahead I’ll tell you how you can be affected by the loose control on your firewall. Okay let me tell you all the worms and root kits that are sent to our computer for stealing the information, uses the specific port number to communicating to the attackers for sending the confidential and critical data to them. By configuring your Windows Firewall with little effort, you can save lots potential harm to your PC.
Windows firewall setting located in
Control Panel >>Administrative Tools >> Windows Firewall with Advanced Security
Or you can quickly go to there by using Run Shortcuts
Run >> ‘Firewall.cpl’ [Enter]
And Selecting Advance option from left plane.
Understanding Windows Firewall
On the Top left corner of the Advance firewall window, you will notice mainly four options.
The Rules listed in your Firewall setting that decide which outer source will be allowed/deny the incoming connection via a port or to a specific application.
Outbound Rules build up the protocol which decides which application from the Windows will communicate from the internet via any know/unknown port.
Connection Security rules
This section contains the security related rules listed inside this section.
Here in this section, you can monitor the incoming and outgoing connection status.
Setting Up advance Firewall
Here in this section, I will tell you how you can configure the connection protocol for any specific application; this will have two sub section, inbound configuration and outbound configuration.
Setting inbound/Outbound Configuration
Let’s start quickly.
Click on the Inbound Rules from Left plane,
You will see the list of Rules set to the incoming connection. You can Double click on the any rule to view the complete description on the rule.
If you want to want to set up the New Rule on the incoming connection, move your mouse on the right side information panel, Click on New Rule
This will open the New Wizard for setting up the Rules,
You will find the four options there,
* Program /* for configuring the connection for specific program */
-If you selected the Program, redirect the path of the program and proceed,
* Port /* Specify the TCP/UDP port for configuring */
– In case you selected the Port, Enter the Port number. Multiple port number can be entered by comma separated value or Range of the ports first port-last port
* Predefined /* Let you select the windows predefined applications */
– Selecting the Predefined program will let you select the sub part of the program to select
* Costume /* Let you customize the option (Expert only) */
– In case costume you have to select the executable application path
Select the One and Proceed by clicking
At the next step you will get the three options out there.
Allow the connection.
– This let you allow connection to the internet via any selected port
Allow the connection if it is secure
– This will allow connection only it is secure and encrypted.
Block the connection
– This will simply block all the incoming and outgoing connection from the outside network
Now click Next..
Now you will get the option asking you to check the checkbox having options when to apply the Rule you have created.
If you are in corporate domain and want to apply the rule check the Domain
If the network domain is private, select the private.
Or select the public for public location
Click on Next
After this you will get the option to Name this new rule and add the description for the other user (like if you are one of group of administrator) and save the Rule. After this your rule will be applied to the computer.
Why to apply these Rules
To prevent unwanted incoming connection to connect any application to internet, that may secretly share your data to person behind.
Prevent updating of software automatically.
Blocking the rootkits, worms to harm your computer.
Hoping this information will help you to make your computer more secure and safe.
Subscribe Author for Updates