DESKTOP

Settings Breakdown for Windows Server 2008 and Windows Vista : Policies (part 4) - Security Settings - Wired Network, Windows Firewall with Advanced Security

10/10/2013 3:55:12 AM
2.3.6 File System (Computer Configuration Only)

Like the Registry policy, this policy allows you to configure NTFS permissions for files and folders on a target computer. You can configure advanced permissions, auditing, and ownership, as well as propagation of the permissions to subfolders.

Warning

Application of permissions to files and folders can be resource intensive and cause delayed computer start-up. You should use this policy only when absolutely necessary and only after testing to ensure that the performance of the start-up is satisfactory for your production environment.


2.3.7 Wired Network (IEEE 802.3) Policies (Computer Configuration Only)

This policy is designed to control wired network security for computers running Windows Vista. The settings in this policy allow you to control many areas of network security. Some of the settings that you can control include the following, which can also be seen in Figures 7 and 8:

  • Authentication protocols

  • Authentication modes

  • Single sign on controls

Figure 7. The Wired Network policy allows control over the authentication protocol and modes.


Figure 8. Advanced settings in the Wired Network policy allow control over single sign on and advanced IEEE 802.1x settings.


2.3.8 Windows Firewall with Advanced Security (Computer Configuration Only)

The updated firewall that comes with Windows Vista and Windows Server 2008 provides additional configurations that enable granular security control over inbound and outbound communications and connection-specific security. You can configure these policies through a set of wizards.

  • Inbound Rule This policy allows you to configure the security of all inbound communications to the target computer. It allows you to configure the type of rule that will be configured (program, ports, services, or customized configuration), action for the rule (allow or block communications), and scope of the rule (domain, private, or public). The interface for the inbound rule is shown in Figure 9.

    Figure 9. This figure shows the Inbound Rule Wizard for the Windows Firewall and Advanced Security policy.
  • Outbound Rule This policy allows you to configure the security of all outbound communications to the target computer. It allows you to configure the type of rule that will be configured (program, ports, services, or customized configuration), action for the rule (allow or block communications), and scope of the rule (domain, private, or public). The interface for the outbound rule is shown in Figure 10.

    Figure 10. This figure shows the Outbound Rule Wizard for the Windows Firewall and Advanced Security policy.
  • Connection Security Rule This policy allows you to configure connection-specific security for the target computer. It allows you to configure the type of rule that will be configured (isolation, authentication controls, server-to-server, tunnel, or custom communication), authentication for the rule, and scope of the rule (domain, private, or public). The interface for the connection security rule is shown in Figure 11.

    Figure 11. This figure shows the Connection Security Rule Wizard for the Windows Firewall and Advanced Security policy.
Other  
  •  Windows 8 : Managing Application Virtualization and Run Levels (part 2) - Setting Run Levels, Optimizing Virtualization and Installation Prompting for Elevation
  •  Windows 8 : Managing Application Virtualization and Run Levels (part 1) - Application Access Tokens and Location Virtualization, Application Integrity and Run Levels
  •  Windows 8 : Installing and Maintaining Applications - Managing Desktop Apps
  •  Windows Server 2003 : Managing Software Deployment with Group Policy (part 2) - Software Deployment Approaches, Distributing Windows Installer Packages
  •  Windows Server 2003 : Managing Software Deployment with Group Policy (part 1) - Software Installation Extension
  •  Windows Server 2003 : Managing Special Folders with Group Policy (part 3) - Folder Redirection Best Practices
  •  Windows Server 2003 : Managing Special Folders with Group Policy (part 2) - Policy Removal Considerations, Folder Redirection and Offline Files
  •  Windows Server 2003 : Managing Special Folders with Group Policy (part 1) - Folder Redirection, Setting Up Folder Redirection
  •  Windows 7 : Computer Management (part 2) - Shared Folders,Services
  •  Windows 7 : Computer Management (part 1) - Task Scheduler, Event Viewer
  •  
    Top 10
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
    OPEL MERIVA : Making a grand entrance
    FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
    BMW 650i COUPE : Sexy retooling of BMW's 6-series
    BMW 120d; M135i - Finely tuned
    PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
    PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
    Java Tutorials : Nested For Loop (part 2) - Program to create a Two-Dimensional Array
    Java Tutorials : Nested For Loop (part 1)
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS