Viewing Rules
Updated: December 1, 2009
Applies To: Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows Vista
Rules allow specified programs, protocols, or services to pass through the firewall. For example, when you enable Remote Desktop in Windows 7 or Windows Vista, Windows creates a rule to allow inbound Remote Desktop connection attempts to reach the computer. To view current rules in Windows Firewall with Advanced Security, in the console tree, click either the Inbound Rules folder or the Outbound Rules folder. Figure 6 shows an example of the Inbound Rules folder. The Inbound Rules folder shows all of the rules currently defined on the computer. To see only the rules that are currently active and enforced, click the Inbound Rules node under Monitoring instead.
To enable a rule, click the rule, and in the Actions list, click Enable Rule. To disable a rule, click the rule, and then click Disable Rule.
Note
If Group Policy has configured Windows Firewall with Advanced Security settings on your computer, then you might not be able to enable or disable firewall or connection security rules. If this is the case, then the Enable Rule and Disable Rule options in the Actions list do not appear.
To view and modify the properties for a rule, click the rule and then click Properties. The property sheet for a rule (shown in Figure 7) displays the tabs and options listed in Table 1.
Table 1. Properties for a rule that can be configured
Tab | Option | Use | |
---|---|---|---|
General |
Name |
Type a name for the rule. |
|
Description |
Type a description for the rule. |
||
Enabled |
Turn the rule on or off. This setting indicates whether the rule is active. Disabled rules do not affect traffic that is allowed or blocked. |
||
Action |
Configure the following options:
|
||
Programs and Services |
Programs |
Specify the full path to the executable file on the local computer. |
|
Services |
Specify the short name of the service to which the rule applies. This is mapped to the security identifier (SID) associated with the service. |
||
Computers |
Authorized computers |
Specify that connections related to this rule are allowed only from a group of computers that you create. You can select this option only if you have also selected the option Allow the connection if it is secure and if the connection has been protected using a credential that provides the Active Directory identity information (most commonly, computer Kerberos v5). |
|
Exceptions |
Specify computers that are not permitted to match this rule, even if they are a member of a computer group that is in the Authorized computers list. This simplifies rule creation by supporting “all computers except this one” type of rules. |
||
Users |
Authorized users |
Specify that connections related to this rule are allowed only from a group of users that you create. You can select this option only if you have also selected the option Allow only secure connections and if the connection has been protected using a credential that provides the Active Directory identity information (most commonly, computer Kerberos v5). |
|
Exceptions |
Specify users that are not permitted to match this rule, even if they are a member of a user group that is in the Authorized users list. This simplifies rule creation by supporting “all users except this one” type of rules. |
||
Protocols and Ports |
Protocol Type |
Specify any type of IP protocol (for example, TCP or UDP). |
|
Protocol Number |
Windows automatically specifies a port number based on the protocol type. If you are using a custom protocol type, you can specify a protocol number. |
||
Local port |
Specify the local port over which traffic can pass. In Windows 7 and Windows Server 2008 R2 you can specify a port range, such as 5000-5010. You can also specify one of the following keywords:
|
||
Remote port |
Specify the remote port over which traffic can pass. In Windows 7 and Windows Server 2008 R2 you can specify a port range, such as 5000-5010. |
||
Internet Control Message Protocol (ICMP) Settings |
Specify ICMP types and codes. This option is available only if the protocol type is ICMPv4 or ICMPv6. |
||
Scope |
Local IP address and Remote IP address |
Specify the local and remote IPv4 or IPv6 addresses, ranges of addresses, and subnets to which the rule applies. |
|
Advanced |
Profiles |
Specify the profiles to which the rule applies. This can be any combination of domain, public, and private profiles. |
|
Interface types |
Specify which interface type a computer connection security rule is applied to, such a local area network, wireless network adapter, or other connection type. |
||
Edge traversal |
Specify whether unsolicited inbound packets that have passed through an edge device such as a NAT router are permitted |