Based on your issue, I have some recommend suggetion you should try and let me know the answer :
1. Verify What Rules Are Applied
Even though Windows Firewall by default blocks inbound ICMP Echo Requests on private/public networks, it allows them on domain networks. Let’s check what's going on.
Run this in PowerShell (as admin):
Get-NetFirewallRule -DisplayName "*File and Printer Sharing (Echo Request - ICMPv4-In)*"
=> This will list all inbound ping-related rules. Look for any "Enabled: True" and "Action: Allow" entries.
2. Disable Ping (ICMPv4-In) Rule Explicitly
You can disable the rule even if it’s active (some programs may enable it again silently).
PowerShell (as admin):
Disable-NetFirewallRule -Name "FPS-ICMP4-In"
Or to block instead of disable, run:
New-NetFirewallRule -Name "BlockICMPv4In" -Protocol ICMPv4 -IcmpType 8 -Direction Inbound -Action Block -DisplayName "Block ICMPv4 Echo Request" -Enabled True
3. Confirm Firewall Profile & Network Type
Check if you're on a Private, Public, or Domain network — the active profile affects the firewall behavior. Run on powershell as Admin
Get-NetConnectionProfile
If it's DomainAuthenticated, that would explain why pings are allowed — domain profiles allow ICMP Echo by default.
4. Check for Conflicting Rules
Make sure no third-party antivirus/firewall is overriding your rules (like McAfee, Norton, etc.). These can silently allow ICMP.
Also check for local group policies, even though Windows 11 Home doesn't have gpedit by default — some registry settings can emulate the same.
5. Reboot & Test Again
After making the changes, reboot to ensure no conflicting cached rules persist.
Then test ping from another machine, not locally.
6. Block ICMP via Advanced Firewall Settings
- Open Windows Defender Firewall with Advanced Security (
wf.msc) - Go to Inbound Rules
- Find all entries named:
- File and Printer Sharing (Echo Request - ICMPv4-In)
- Disable or block them for all profiles.