Learn about how to do detailed configuration of the Windows Firewall.
- [Instructor] Now we've looked at…the basic operation of Windows Firewall.…Let's take a look at the Advanced Settings.…When I click on this link, the Windows Firewall…with Advanced Security screen is displayed.…This is intended for system administrators…in an enterprise network.…We can see that at the middle panel,…we have profiles for private and public zones,…and also for an additional zone called domain.…The domain zone is for the enterprise LAN.…The various functions in this screen…can be accessed through the rule items on the left,…the properties linked in the middle panel,…or from the Action links on the right.…
Advanced security allows us to apply…specific restrictions to connections,…and also provides three additional features,…which are useful in an enterprise configuration,…ensuring computers authenticate to each other…before they connect.…The data integrity is checked…on all communications received,…and the data is encrypted during transmission.…We've already looked at connections…which are allowed or blocked,…
Released
2/15/2017Note: Learning about ethical hacking for perimeter defenses is part of the Evading IDS, Firewalls, and Honeypots competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Understanding firewalls
- Applying the basics of the Windows Firewall
- Using advanced features in the Windows Firewall
- Reviewing firewall logs
- Understanding Linux iptables
- Setting up an iptables firewall
- Managing rules with Firewall Builder
- Setting up a Cisco PIX firewall
- Creating a secure enclave
- Installing GNS3
- Understanding web application firewalls
- Protecting API services with the WSO2 gateway
- Running the Cowrie honeypot
- Detecting intrusions with Security Onion
Share this video
Embed this video
Video: Using advanced features in the Windows Firewall