Technology Networking & Internet

Windows Firewall Options

    • Windows Firewall functionality resides in Control Panel->System and Security->Windows Firewall. It is there to help Windows users stop intruders or hackers from obtaining access to their computer through the network. It creates a barrier between your computer and the Internet. When the Window Firewall is turned on, incoming connections are monitored and checked every time they try to connect to computer programs. It sends notifications when it blocks a program. The Windows 7 Operating System has options for its firewall.

    Windows Firewall State

    • Windows Firewall is enabled by default no matter what connections you are presently on, such as LAN, Dial-up and Virtual Private Network Connections. When you set up new connections, Windows Firewall is enabled by default. This default activity provides security for computers, but it also creates barriers for network administrators of an organization network in terms of application compatibility and the capability to manage the computers on the network.

    Allowing Programs to Communicate Through Windows Firewall

    • This is to add, change and remove allowed programs and ports. Each time you open a port or allow a program to communicate through Windows Firewall, you computer becomes less protected. The more allowed programs or ports, the more chances hackers or malicious programs can hack into your system. To mitigate the security risk, you should only allow program or ports when you really need to and remove those from the list of allowed immediately when they are no longer needed. You should never permit an unrecognized program to communicate through the firewall.

    Windows Firewall with Advanced Security on Local Computer

    • This option is to allow users to create connection security rules that define how and when the connections between computers are verified and secured by Internet Protocol Security (IPSec). Firewall rules can be created to allow or block connections to specific programs or ports so that you can only allow a connection when it is authenticated or it is from an authenticated user. Inbound or outbound rules can be enabled or disabled and new rules can be defined. For instance, DHCP (Dynamic Host Configuration Protocol) rule can be specified and enabled or disabled.

    Monitoring with Advanced Security

    • This option enables users to monitor the active firewall rules and connection security rules on the computer. The overview page illustrates information regarding active profiles and present settings of these active profiles.

Related posts "Technology : Networking & Internet"

Advice on Successfully Hunting organization

Networking

Making Money Online

Networking

Be Well Informed With Your Next Personal Finance Venture - Tips You Need To Know

Networking

Great Clip Art For Making Father's Day Cards

Networking

How to Find Out If a Provider Blocks a Port

Networking

How to Create Email Accounts for Kids

Networking

Internet Marketing Routes: Pay Per Click and Online Reputation Management Services.

Networking

How to Create Scrolling Photos in Dreamweaver

Networking

How to Convert IP Addresses to Decimal Format

Networking

Leave a Comment