| Policy | Setting |
| Windows Firewall: Allow file and printer sharing exception | Enabled |
| Allow unsolicited incoming messages from: | 10.0.0.0/8,128.227.0.0/16 |
| Syntax: | | Type "*" to allow messages from any network, or | | else type a comma-separated list that contains | | any number or combination of these: | | IP addresses, such as 10.0.0.1 | | Subnet descriptions, such as 10.2.3.0/24 | | The string "localsubnet" | | Example: to allow messages from 10.0.0.1, | | 10.0.0.2, and from any system on the | | local subnet or on the 10.3.4.x subnet, | | type the following: | | 10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24 | |
| Policy | Setting |
| Windows Firewall: Allow ICMP exceptions | Enabled |
| Allow outbound destination unreachable | Enabled |
| Allow outbound source quench | Disabled |
| Allow redirect | Disabled |
| Allow inbound echo request | Enabled |
| Allow inbound router request | Enabled |
| Allow outbound time exceeded | Disabled |
| Allow outbound parameter problem | Disabled |
| Allow inbound timestamp request | Disabled |
| Allow inbound mask request | Disabled |
| Allow outbound packet too big | Enabled |
|
| Policy | Setting |
| Windows Firewall: Allow local port exceptions | Disabled |
| Windows Firewall: Allow local program exceptions | Disabled |
| Windows Firewall: Allow logging | Enabled |
| Log dropped packets | Enabled |
| Log successful connections | Enabled |
| Log file path and name: | c:\windows\firewall.log |
| Size limit (KB): | 10240 |
|
| Policy | Setting |
| Windows Firewall: Allow remote administration exception | Enabled |
| Allow unsolicited incoming messages from: | 10.0.0.0/8,128.227.0.0/16 |
| Syntax: | | Type "*" to allow messages from any network, or | | else type a comma-separated list that contains | | any number or combination of these: | | IP addresses, such as 10.0.0.1 | | Subnet descriptions, such as 10.2.3.0/24 | | The string "localsubnet" | | Example: to allow messages from 10.0.0.1, | | 10.0.0.2, and from any system on the | | local subnet or on the 10.3.4.x subnet, | | type the following: | | 10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24 | |
| Policy | Setting |
| Windows Firewall: Allow Remote Desktop exception | Enabled |
| Allow unsolicited incoming messages from: | * |
| Syntax: | | Type "*" to allow messages from any network, or | | else type a comma-separated list that contains | | any number or combination of these: | | IP addresses, such as 10.0.0.1 | | Subnet descriptions, such as 10.2.3.0/24 | | The string "localsubnet" | | Example: to allow messages from 10.0.0.1, | | 10.0.0.2, and from any system on the | | local subnet or on the 10.3.4.x subnet, | | type the following: | | 10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24 | |
| Policy | Setting |
| Windows Firewall: Allow UPnP framework exception | Disabled |
| Windows Firewall: Do not allow exceptions | Disabled |
| Windows Firewall: Prohibit notifications | Enabled |
| Windows Firewall: Prohibit unicast response to multicast or broadcast requests | Disabled |
| Windows Firewall: Protect all network connections | Enabled |