| Policy | Setting | Comment |
| Windows Defender Firewall: Allow ICMP exceptions | Enabled | |
| Allow outbound destination unreachable | Enabled |
| Allow outbound source quench | Enabled |
| Allow redirect | Enabled |
| Allow inbound echo request | Enabled |
| Allow inbound router request | Enabled |
| Allow outbound time exceeded | Enabled |
| Allow outbound parameter problem | Enabled |
| Allow inbound timestamp request | Enabled |
| Allow inbound mask request | Enabled |
| Allow outbound packet too big | Enabled |
|
| Policy | Setting | Comment |
| Windows Defender Firewall: Allow inbound file and printer sharing exception | Enabled | |
| Allow unsolicited incoming messages from these IP addresses: | 10.117.1.0/24,10.117.129.0/24,10.50.0.13,10.50.0.14,10.117.96.0/24,10.204.8.182,10.117.210.0/24,10.117.192.0/24,10.117.132.0/24,10.117.3.0/24,10.117.196.0/23 |
| Syntax: | | Type "*" to allow messages from any network, or | | else type a comma-separated list that contains | | any number or combination of these: | | IP addresses, such as 10.0.0.1 | | Subnet descriptions, such as 10.2.3.0/24 | | The string "localsubnet" | | Example: to allow messages from 10.0.0.1, | | 10.0.0.2, and from any system on the | | local subnet or on the 10.3.4.x subnet, | | type the following in the "Allow unsolicited" | | incoming messages from these IP addresses": | | 10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24 | |
| Policy | Setting | Comment |
| Windows Defender Firewall: Allow inbound remote administration exception | Enabled | |
| Allow unsolicited incoming messages from these IP addresses: | 10.0.64.0/23,10.30.1.0/24,10.117.1.0/24,10.117.129.0/24,10.117.5.0/24,10.117.202.0/28,10.117.210.0/24,10.117.192.0/24,10.117.132.0/24,10.117.3.0/24,10.117.196.0/23 |
| Syntax: | | Type "*" to allow messages from any network, or | | else type a comma-separated list that contains | | any number or combination of these: | | IP addresses, such as 10.0.0.1 | | Subnet descriptions, such as 10.2.3.0/24 | | The string "localsubnet" | | Example: to allow messages from 10.0.0.1, | | 10.0.0.2, and from any system on the | | local subnet or on the 10.3.4.x subnet, | | type the following in the "Allow unsolicited" | | incoming messages from these IP addresses": | | 10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24 | |
| Policy | Setting | Comment |
| Windows Defender Firewall: Allow inbound Remote Desktop exceptions | Enabled | |
| Allow unsolicited incoming messages from these IP addresses: | * |
| Syntax: | | Type "*" to allow messages from any network, or | | else type a comma-separated list that contains | | any number or combination of these: | | IP addresses, such as 10.0.0.1 | | Subnet descriptions, such as 10.2.3.0/24 | | The string "localsubnet" | | Example: to allow messages from 10.0.0.1, | | 10.0.0.2, and from any system on the | | local subnet or on the 10.3.4.x subnet, | | type the following in the "Allow unsolicited" | | incoming messages from these IP addresses": | | 10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24 | |
| Policy | Setting | Comment |
| Windows Defender Firewall: Allow local program exceptions | Enabled | |
| Windows Defender Firewall: Define inbound program exceptions | Enabled | |
| Define program exceptions: |
| %LocalAppData%\Microsoft\Teams\current\Teams.exe |
| %LocalAppData%\Microsoft\Teams\Update.exe |
| C:\Program Files (x86)\Avaya\Avaya one-X Communicator\onexcui.exe |
| | Specify the program to allow or block. | | Syntax: | | <Path>:<Scope>:<Status>:<Name> | | <Path> is the program path and file name | | <Scope> is either "*" (for all networks) or | | a comma-separated list that contains | | any number or combination of these: | | IP addresses, such as 10.0.0.1 | | Subnet descriptions, such as 10.2.3.0/24 | | The string "localsubnet" | | <Status> is either "enabled" or "disabled" | | <Name> is a text string | | Example: | | The following definition string adds the | | TEST.EXE program to the program exceptions list | | and allows it to receive messages from 10.0.0.1, | | or any system on the 10.3.4.x subnet: | | %programfiles%\test.exe:10.0.0.1,10.3.4.0/24:enabled:Test program | |
| Policy | Setting | Comment |
| Windows Defender Firewall: Prohibit notifications | Disabled | |
| Windows Defender Firewall: Prohibit unicast response to multicast or broadcast requests | Disabled | |
| Windows Defender Firewall: Protect all network connections | Enabled | |