Help: Administering Windows Firewall with Group Policy
Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
Administering Windows Firewall with Group Policy
If your organization uses the Active Directory directory service, you can configure and manage Windows Firewall with the new Windows Firewall Group Policy settings. When you use Group Policy to configure Windows Firewall, local administrators and users will be unable to locally configure some Windows Firewall configuration settings by using Windows Firewall in Control Panel. Specifically, when a Windows Firewall setting is configured through Group Policy, the equivalent setting appears dimmed in Windows Firewall in Control Panel.
Windows Firewall Group Policy Settings
There are two sets of Windows Firewall policy settings:
The domain profile settings, which are used when a computer is connected to a network that contains the organization's domain controllers.
The standard profile settings, which are used when a computer is connected to a network that does not contain the organization's domain controllers.
If you do not configure profile settings, their default values are applied. Therefore, it is highly recommended that you configure both domain and standard profile settings so that you maintain your desired level of security in the event your computer changes from one profile to another. Also, the standard profile settings are typically more restrictive that the domain profile settings because the standard profile settings do not need to include applications and services that are used only in a managed domain environment. Both the domain profile and standard profile contain the same set of Windows Firewall configuration settings.
The following Group Policy settings are available for managing Windows Firewall. These settings can be found at the following location in the Group Policy Editor snap-in:
- Computer Configuration\Administrative Templates\Network\Network Connections\Windows Firewall\Domain Profile or Standard Profile
Group Policy setting | Description |
---|---|
Windows Firewall: Protect all network connections |
Used to specify that all network connections have Windows Firewall enabled. |
Windows Firewall: Do not allow exceptions |
Used to specify that all unsolicited incoming traffic is dropped, including traffic that has been added to the exceptions list. |
Windows Firewall: Define program exceptions |
Used to define by application file names traffic that has been added to the exceptions list. |
Windows Firewall: Allow local program exceptions |
Used to enable local configuration of program exceptions. |
Windows Firewall: Allow remote administration exception |
Used to enable remote procedure calls (RPC) and Distributed Component Object Model (DCOM), which are necessary for many remote administration using tools such as Microsoft Management Console (MMC) and Windows Management Instrumentation (WMI). |
Windows Firewall: Allow file and printer sharing exception |
Used to specify whether file and printer sharing traffic is allowed. |
Windows Firewall: Allow ICMP exceptions |
Used to specify the types of unsolicited Internet Control Message Protocol (ICMP) traffic allowed. |
Windows Firewall: Allow Remote Desktop exception |
Used to specify whether the computer can accept a Remote Desktop-based connection request. |
Windows Firewall: Allow UPnP framework exception |
Used to specify whether the computer can participate in UPnP discovery. |
Windows Firewall: Prohibit notifications |
Used to disable notifications when an application uses new Windows Firewall application programming interfaces (APIs) to request traffic that has been added to the exceptions list. |
Windows Firewall: Allow logging |
Used to enable logging of discarded traffic, successful connections, and configure log file settings. |
Windows Firewall: Prohibit unicast response to multicast or broadcast requests |
Used to discard the unicast packets sent in response to a multicast or broadcast request. |
Windows Firewall: Define port exceptions |
Used to specify by TCP and UDP ports traffic that has been added to the exceptions list. |
Windows Firewall: Allow local port exceptions |
Used to enable local configuration of port exceptions. |
You can also configure the Windows Firewall: Allow authenticated IPSec bypass police setting, which can be found at the following location in the Group Policy Editor snap-in:
Computer Configuration\Administrative Templates\Network\Network Connections\Windows Firewall
This policy setting allows unsolicited incoming messages from specified systems that authenticate using IPSec.
Notes
Windows Firewall is not included in the original release of the Windows Server 2003 operating systems.
You cannot use Group Policy to configure Windows Firewall per-connection settings.
Group Policy settings must be refreshed before they take effect.
See Also
Concepts
Help: Understanding Windows Firewall
Help: Administering Windows Firewall
Help: Windows Firewall How To...