Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
EGCAI-PO-WIN-DU Firewall
Data collected on: 2-9-2025 09:42:28
General
Details
Domainemea.tpg.ads
OwnerS-1-5-21-513466819-3096973226-347852806-409962
Created20-3-2020 14:04:12
Modified9-2-2023 14:51:38
User Revisions1 (AD), 1 (SYSVOL)
Computer Revisions7 (AD), 7 (SYSVOL)
Unique ID{b0bc4295-c66a-481e-a153-85b31b3e0743}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
ClientsNoEnabledemea.tpg.ads/EG/Systems/Clients

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
EMEA\EGCAI-G-ORG-Client System Du
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\Domain AdminsEdit settings, delete, modify securityNo
EMEA\Domain ComputersReadNo
EMEA\Domain UsersReadNo
EMEA\EGCAI-G-ORG-Client System DuRead (from Security Filtering)No
EMEA\EG-G-ORG-OU AdminsEdit settingsNo
NT AUTHORITY\Authenticated UsersReadNo
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
ROOT\Enterprise AdminsEdit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-409962Edit settings, delete, modify securityNo
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
Windows Firewall with Advanced Security
Global Settings
PolicySetting
Policy version2.30
Disable stateful FTPNot Configured
Disable stateful PPTPNot Configured
IPsec exemptNot Configured
IPsec through NATNot Configured
Preshared key encodingNot Configured
SA idle timeNot Configured
Strong CRL checkNot Configured
Domain Profile Settings
PolicySetting
Firewall stateOn
Inbound connectionsBlock
Outbound connectionsAllow
Apply local firewall rulesYes
Apply local connection security rulesYes
Display notificationsNot Configured
Allow unicast responsesNot Configured
Log dropped packetsYes
Log successful connectionsYes
Log file pathNot Configured
Log file maximum size (KB)32767
Private Profile Settings
PolicySetting
Firewall stateOn
Inbound connectionsBlock
Outbound connectionsAllow
Apply local firewall rulesYes
Apply local connection security rulesYes
Display notificationsYes
Allow unicast responsesYes
Log dropped packetsYes
Log successful connectionsYes
Log file pathNot Configured
Log file maximum size (KB)32767
Public Profile Settings
PolicySetting
Firewall stateOn
Inbound connectionsBlock
Outbound connectionsAllow
Apply local firewall rulesYes
Apply local connection security rulesYes
Display notificationsYes
Allow unicast responsesYes
Log dropped packetsYes
Log successful connectionsYes
Log file pathNot Configured
Log file maximum size (KB)32767
Inbound Rules
NameDescription
Ipcomm
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%systemroot%\%Program Files%\Cisco Systems\cisco ip communicator\
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
ProtocolAny
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
Mcafee
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%systemroot%\%Program Files%\McAfee\VirusScan Enterprise\mcconsol.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
ProtocolAny
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
DCOM UDP
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceDcomLaunch
Allow edge traversalFalse
Group
Remote Administration (RPC-EPMAP)Inbound rule for the RPCSS service to allow RPC/TCP traffic for all the local services.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portRPC endpoint mapping
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceRPCSS
Allow edge traversalFalse
GroupRemote Administration
Remote Administration (NP-In)Inbound rule for all services to be remotely managed over Named Pipes.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port445
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupRemote Administration
Remote Administration (RPC)Inbound rule for all services to be remotely managed via RPC/TCP.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portDynamic RPC
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAny service
Allow edge traversalFalse
GroupRemote Administration
SCCM
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port80, 443, 445, 8530, 8531, 2701, 2702, 135, 3389
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
SCCM UDP
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port2701, 2702
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
Windows Management Instrumentation (ASync-In)Inbound rule to allow Asynchronous WMI traffic for remote Windows Management Instrumentation. [TCP]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%systemroot%\system32\wbem\unsecapp.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupWindows Management Instrumentation (WMI)
Windows Management Instrumentation (WMI-In)Inbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
Servicewinmgmt
Allow edge traversalFalse
GroupWindows Management Instrumentation (WMI)
Windows Management Instrumentation (DCOM-In)Inbound rule to allow DCOM traffic for remote Windows Management Instrumentation. [TCP 135]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port135
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
Servicerpcss
Allow edge traversalFalse
GroupWindows Management Instrumentation (WMI)
File and Printer Sharing (LLMNR-UDP-In)Inbound rule for File and Printer Sharing to allow Link Local Multicast Name Resolution. [UDP 5355]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port5355
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeLocal subnet
ProfileAll
Network interface typeAll
Servicednscache
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (Echo Request - ICMPv6-In)Echo Request messages are sent as ping requests to other nodes.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol58
Local portAny
Remote portAny
ICMP settingstype 128:code any
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (Echo Request - ICMPv4-In)Echo Request messages are sent as ping requests to other nodes.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol1
Local portAny
Remote portAny
ICMP settingstype 8:code any
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (Spooler Service - RPC-EPMAP)Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Spooler Service.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portRPC endpoint mapping
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceRpcss
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (Spooler Service - RPC)Inbound rule for File and Printer Sharing to allow the Print Spooler Service to communicate via TCP/RPC.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\spoolsv.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portDynamic RPC
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceSpooler
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (NB-Datagram-In)Inbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP 138]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port138
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (NB-Name-In)Inbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port137
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (SMB-In)Inbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP 445]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port445
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupFile and Printer Sharing
File and Printer Sharing (NB-Session-In)Inbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port139
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupFile and Printer Sharing
Inbound TFTP
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
ProtocolAny
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scope10.255.14.0/255.255.255.0
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
DUQM
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port4001
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
TPObserver
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port8099
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
allow 5001-5002
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port5001-5002
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
Allow Avaya SoftPhone
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramC:\program files (x86)\avaya\avaya one-x agent\sparkemulator.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
ProtocolAny
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
allow port 80,443
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port443
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
Allow Avaya One X
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramC:\Program Files (x86)\Avaya\Avaya one-X Agent\OneXAgentUI.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
ProtocolAny
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
Proxy
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port9990-9999
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
Outbound Rules
NameDescription
File and Printer Sharing (LLMNR-UDP-Out)Outbound rule for File and Printer Sharing to allow Link Local Multicast Name Resolution. [UDP 5355]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Protocol17
Local portAny
Remote port5355
ICMP settingsAny
Local scopeAny
Remote scopeLocal subnet
ProfileAll
Network interface typeAll
Servicednscache
GroupFile and Printer Sharing
File and Printer Sharing (Echo Request - ICMPv6-Out)Echo Request messages are sent as ping requests to other nodes.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Protocol58
Local portAny
Remote portAny
ICMP settingstype 128:code any
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
GroupFile and Printer Sharing
File and Printer Sharing (Echo Request - ICMPv4-Out)Echo Request messages are sent as ping requests to other nodes.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Protocol1
Local portAny
Remote portAny
ICMP settingstype 8:code any
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
GroupFile and Printer Sharing
File and Printer Sharing (NB-Datagram-Out)Outbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP 138]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Protocol17
Local portAny
Remote port138
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
GroupFile and Printer Sharing
File and Printer Sharing (NB-Name-Out)Outbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Protocol17
Local portAny
Remote port137
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
GroupFile and Printer Sharing
File and Printer Sharing (SMB-Out)Outbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP 445]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Protocol6
Local portAny
Remote port445
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
GroupFile and Printer Sharing
File and Printer Sharing (NB-Session-Out)Outbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Protocol6
Local portAny
Remote port139
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
GroupFile and Printer Sharing
Outbound TFTP
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
ProtocolAny
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scope10.255.14.0/255.255.255.0
ProfileAll
Network interface typeAll
ServiceAll programs and services
Group
Connection Security Settings
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Network/Network Connections/Windows Defender Firewall/Domain Profile
PolicySettingComment
Windows Defender Firewall: Allow ICMP exceptionsEnabled
Allow outbound destination unreachableDisabled
Allow outbound source quenchDisabled
Allow redirectDisabled
Allow inbound echo requestEnabled
Allow inbound router requestDisabled
Allow outbound time exceededDisabled
Allow outbound parameter problemDisabled
Allow inbound timestamp requestDisabled
Allow inbound mask requestDisabled
Allow outbound packet too bigDisabled
PolicySettingComment
Windows Defender Firewall: Allow inbound remote administration exception Enabled
Allow unsolicited incoming messages from these IP addresses:10.10.1.75,10.10.1.27
Syntax:
Type "*" to allow messages from any network, or
else type a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
Example: to allow messages from 10.0.0.1,
10.0.0.2, and from any system on the
local subnet or on the 10.3.4.x subnet,
type the following in the "Allow unsolicited"
incoming messages from these IP addresses":
10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24
PolicySettingComment
Windows Defender Firewall: Allow inbound Remote Desktop exceptionsEnabled
Allow unsolicited incoming messages from these IP addresses:10.10.100.0/24,10.10.1.0/24
Syntax:
Type "*" to allow messages from any network, or
else type a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
Example: to allow messages from 10.0.0.1,
10.0.0.2, and from any system on the
local subnet or on the 10.3.4.x subnet,
type the following in the "Allow unsolicited"
incoming messages from these IP addresses":
10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24
PolicySettingComment
Windows Defender Firewall: Allow loggingEnabled
Log dropped packetsEnabled
Log successful connectionsEnabled
Log file path and name: 
Size limit (KB):32767
PolicySettingComment
Windows Defender Firewall: Define inbound program exceptionsEnabled
Define program exceptions:
%PROGRAMFILES%\Cisco Systems\Cisco IP Communicator\communicatork9.exe:*:enabled:Cisco IP Communicator
%PROGRAMFILES%\Cisco Systems\Cisco IP Communicator\AudioTuningWizard.exe:*:enabled:Cisco Audio
Specify the program to allow or block.
Syntax:
<Path>:<Scope>:<Status>:<Name>
<Path> is the program path and file name
<Scope> is either "*" (for all networks) or
a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
<Status> is either "enabled" or "disabled"
<Name> is a text string
Example:
The following definition string adds the
TEST.EXE program to the program exceptions list
and allows it to receive messages from 10.0.0.1,
or any system on the 10.3.4.x subnet:
%programfiles%\test.exe:10.0.0.1,10.3.4.0/24:enabled:Test program
PolicySettingComment
Windows Defender Firewall: Protect all network connectionsEnabled
Network/Network Connections/Windows Defender Firewall/Standard Profile
PolicySettingComment
Windows Defender Firewall: Allow ICMP exceptionsEnabled
Allow outbound destination unreachableDisabled
Allow outbound source quenchDisabled
Allow redirectDisabled
Allow inbound echo requestEnabled
Allow inbound router requestDisabled
Allow outbound time exceededDisabled
Allow outbound parameter problemDisabled
Allow inbound timestamp requestDisabled
Allow inbound mask requestDisabled
Allow outbound packet too bigDisabled
PolicySettingComment
Windows Defender Firewall: Allow inbound Remote Desktop exceptionsEnabled
Allow unsolicited incoming messages from these IP addresses:10.10.100.0/24,10.10.1.0/24
Syntax:
Type "*" to allow messages from any network, or
else type a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
Example: to allow messages from 10.0.0.1,
10.0.0.2, and from any system on the
local subnet or on the 10.3.4.x subnet,
type the following in the "Allow unsolicited"
incoming messages from these IP addresses":
10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24
PolicySettingComment
Windows Defender Firewall: Define inbound program exceptionsEnabled
Define program exceptions:
%PROGRAMFILES%\Cisco Systems\Cisco IP Communicator\communicatork9.exe:*:enabled:Cisco IP Communicator
Specify the program to allow or block.
Syntax:
<Path>:<Scope>:<Status>:<Name>
<Path> is the program path and file name
<Scope> is either "*" (for all networks) or
a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
<Status> is either "enabled" or "disabled"
<Name> is a text string
Example:
The following definition string adds the
TEST.EXE program to the program exceptions list
and allows it to receive messages from 10.0.0.1,
or any system on the 10.3.4.x subnet:
%programfiles%\test.exe:10.0.0.1,10.3.4.0/24:enabled:Test program
User Configuration (Enabled)
No settings defined.