Policy | Setting |
Windows Firewall: Allow file and printer sharing exception | Enabled |
Allow unsolicited incoming messages from: | 10.0.0.0/8,128.227.0.0/16 |
Syntax: | Type "*" to allow messages from any network, or | else type a comma-separated list that contains | any number or combination of these: | IP addresses, such as 10.0.0.1 | Subnet descriptions, such as 10.2.3.0/24 | The string "localsubnet" | Example: to allow messages from 10.0.0.1, | 10.0.0.2, and from any system on the | local subnet or on the 10.3.4.x subnet, | type the following: | 10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24 | |
Policy | Setting |
Windows Firewall: Allow ICMP exceptions | Enabled |
Allow outbound destination unreachable | Enabled |
Allow outbound source quench | Disabled |
Allow redirect | Disabled |
Allow inbound echo request | Enabled |
Allow inbound router request | Enabled |
Allow outbound time exceeded | Disabled |
Allow outbound parameter problem | Disabled |
Allow inbound timestamp request | Disabled |
Allow inbound mask request | Disabled |
Allow outbound packet too big | Enabled |
|
Policy | Setting |
Windows Firewall: Allow local port exceptions | Disabled |
Windows Firewall: Allow local program exceptions | Disabled |
Windows Firewall: Allow logging | Enabled |
Log dropped packets | Enabled |
Log successful connections | Enabled |
Log file path and name: | c:\windows\firewall.log |
Size limit (KB): | 10240 |
|
Policy | Setting |
Windows Firewall: Allow remote administration exception | Enabled |
Allow unsolicited incoming messages from: | 10.0.0.0/8,128.227.0.0/16 |
Syntax: | Type "*" to allow messages from any network, or | else type a comma-separated list that contains | any number or combination of these: | IP addresses, such as 10.0.0.1 | Subnet descriptions, such as 10.2.3.0/24 | The string "localsubnet" | Example: to allow messages from 10.0.0.1, | 10.0.0.2, and from any system on the | local subnet or on the 10.3.4.x subnet, | type the following: | 10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24 | |
Policy | Setting |
Windows Firewall: Allow Remote Desktop exception | Enabled |
Allow unsolicited incoming messages from: | * |
Syntax: | Type "*" to allow messages from any network, or | else type a comma-separated list that contains | any number or combination of these: | IP addresses, such as 10.0.0.1 | Subnet descriptions, such as 10.2.3.0/24 | The string "localsubnet" | Example: to allow messages from 10.0.0.1, | 10.0.0.2, and from any system on the | local subnet or on the 10.3.4.x subnet, | type the following: | 10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24 | |
Policy | Setting |
Windows Firewall: Allow UPnP framework exception | Disabled |
Windows Firewall: Do not allow exceptions | Disabled |
Windows Firewall: Prohibit notifications | Enabled |
Windows Firewall: Prohibit unicast response to multicast or broadcast requests | Disabled |
Windows Firewall: Protect all network connections | Enabled |