SlideShare a Scribd company logo
A walk through Windows
Firewall & Netsh commands
Rhydham Joshi
M.S. in Software Engineering, San Jose State University
Phone : (+1) 408-987-1991 | Email : rhydham.joshi@yahoo.com
Blog : malwareforensics1.blogspot.com | Linkedin : www.linkedin.com/in/rhydhamjoshi
Contents:
 Navigation to firewall settings
 Firewall Tabs:
• Allow an app or feature through firewall
• Change notification settings
• Turn Windows Firewall on/off
• Restore defaults
• Advanced settings
 Windows Firewall with Advanced Security Tabs:
 Activate logging for allowed/denied traffic
 Inbound and outbound rules in brief
 Monitoring Tab: The things we need to take care about
• Firewall
• Logs Exploration
 Netsh commands
 References
Navigation to Firewall settings
• Control Panel -> System and Security -> Windows Firewall
• Run command : firewall.cpl
• Type : Windows Firewall in Windows search box.
Allow an app or feature through windows firewall
• Allow/Deny any
app/services in
Private/Public network
Allow an app or feature through windows firewall
Change Notification Settings &
Turn Windows Firewall on or off
Advanced Settings:
Tabs: Windows Firewall with Advanced
Security
Activate Logging for allowed/denied traffic
• In Domain Profile Tab 
Logging  Customize 
See the dialog box for
“Customize Logging Settings
for the Domain Profile”
• Click YES for “Log Dropped Packets”
& “Log Successful Connections”
• Repeat steps for “Private Profile”
& “Public Profile”
Activate Logging for allowed/denied traffic
Inbound Rules and Outbound Rules
Inbound & Outbound Rules
Inbound & Outbound Rules
Inbound & Outbound Rules
Inbound & Outbound Rules
Inbound & Outbound Rules
Inbound & Outbound Rules
Inbound & Outbound Rules
Inbound & Outbound Rules
Monitoring: The thing “WE” need to care about
Monitoring  Firewall
Explore the logs
Network shell commands
• Import/Export Firewall Settings
• Enable Remote Desktop
Connection
• Enable a program
• Enable/disable a port
• Enable Remote Management
• Allow/Disallow Ping
• Change Logging path
• Restore Defaults
• Enable/disable Windows Firewall
• Query Firewall logs
Netsh Commands Reference Links:
Netsh Commands reference link:
https://technet.microsoft.com/en-us/library/cc732279(v=ws.10).aspx
Netsh Commands for Windows Firewall:
https://technet.microsoft.com/en-us/library/cc771046(v=ws.10).aspx
Netsh Commands for Windows Firewall and Advanced Security:
https://technet.microsoft.com/en-us/library/cc771920(v=ws.10).aspx
Top 10 Netsh firewall commands:
http://windowsitpro.com/windows-server/top-10-windows-firewall-
netsh-commands
Thank you.!

More Related Content

PPTX
Anomalies Detection: Windows OS - Part 1
PDF
CNIT 121: 3 Pre-Incident Preparation
PDF
CNIT 152: 1 Real-World Incidents
PDF
Ch 13: Network Protection Systems
PPTX
Malware Analysis and Defeating using Virtual Machines
PDF
CNIT 152: 9 Network Evidence
PDF
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
PDF
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
Anomalies Detection: Windows OS - Part 1
CNIT 121: 3 Pre-Incident Preparation
CNIT 152: 1 Real-World Incidents
Ch 13: Network Protection Systems
Malware Analysis and Defeating using Virtual Machines
CNIT 152: 9 Network Evidence
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)

What's hot (20)

PDF
CNIT 121: 9 Network Evidence
PPTX
Basic Dynamic Analysis of Malware
PDF
CNIT 152: 12b Windows Registry
PPS
Workshop on BackTrack live CD
PPT
Kunal - Introduction to backtrack - ClubHack2008
PPTX
Remnux tutorial-1 Statically Analyse Portable Executable(PE) Files
PDF
CNIT 152: 1 Real-World Incidents
PDF
CNIT 152: 9 Network Evidence
PDF
Ch 4: Footprinting and Social Engineering
ODP
Malware analysis - What to learn from your invaders
PDF
CNIT 121: 14 Investigating Applications
PDF
CNIT 152: 4 Starting the Investigation & 5 Leads
PPTX
Malware analysis
PDF
CNIT 152 12. Investigating Windows Systems (Part 3)
PDF
CNIT 152 12 Investigating Windows Systems (Part 2)
PDF
Investigating Hackers' Tools
PDF
CNIT 152: 6. Scope & 7. Live Data Collection
PDF
CNIT 123: Ch 3: Network and Computer Attacks
PDF
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
PPTX
Web application security part 01
CNIT 121: 9 Network Evidence
Basic Dynamic Analysis of Malware
CNIT 152: 12b Windows Registry
Workshop on BackTrack live CD
Kunal - Introduction to backtrack - ClubHack2008
Remnux tutorial-1 Statically Analyse Portable Executable(PE) Files
CNIT 152: 1 Real-World Incidents
CNIT 152: 9 Network Evidence
Ch 4: Footprinting and Social Engineering
Malware analysis - What to learn from your invaders
CNIT 121: 14 Investigating Applications
CNIT 152: 4 Starting the Investigation & 5 Leads
Malware analysis
CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 152 12 Investigating Windows Systems (Part 2)
Investigating Hackers' Tools
CNIT 152: 6. Scope & 7. Live Data Collection
CNIT 123: Ch 3: Network and Computer Attacks
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Web application security part 01
Ad

Viewers also liked (11)

PDF
Port numbers
PDF
Common Ports
PPT
Guide to Windows 7 - Using the System Utilities
PPTX
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documents
PPTX
REMnux tutorial-2: Extraction and decoding of Artifacts
PDF
Webinar Gratuito: "Analisis Forense al Firewall de Windows"
PPTX
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
PDF
The 20 Common ports
PPTX
20 common port numbers and their purposes
PPT
Windows 7 firewall & its configuration
Port numbers
Common Ports
Guide to Windows 7 - Using the System Utilities
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documents
REMnux tutorial-2: Extraction and decoding of Artifacts
Webinar Gratuito: "Analisis Forense al Firewall de Windows"
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
The 20 Common ports
20 common port numbers and their purposes
Windows 7 firewall & its configuration
Ad

Similar to A walk through Windows firewall and Netsh commands (20)

PPTX
12 Securing Windows Servers by Using Group Policy Objects.pptx
PPTX
Copy of learn_the_art_of_firewall_security(1)
PPTX
ManageEngine Firewall Analyzer training
PPTX
Microsoft Offical Course 20410C_12
PPTX
Commissioning, Managing & Troubleshooting Industrial Networks
PDF
CursoFirewallWG_2022.pdf
PPTX
Reckon Conf2015 (AU / NZ) Reckon Accounts Hosted - Geek speakv2
PPTX
Cisco umbrella youtube
PDF
Seven steps to better security
PPTX
Dncybersecurity
PPTX
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
PDF
Expand Your Control of Access to IBM i Systems and Data
PDF
Controlling Access to IBM i Systems and Data
PPTX
Social Distance Your IBM i from Cybersecurity Risk
PDF
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
PPTX
System hardening - OS and Application
PPTX
What's new in WatchGuard Fireware_v12-7-2.pptx
PPTX
Design Like a Pro: SCADA Security Guidelines
PPTX
Design Like a Pro: SCADA Security Guidelines
PPT
Network Security, Change Control, Outsourcing
12 Securing Windows Servers by Using Group Policy Objects.pptx
Copy of learn_the_art_of_firewall_security(1)
ManageEngine Firewall Analyzer training
Microsoft Offical Course 20410C_12
Commissioning, Managing & Troubleshooting Industrial Networks
CursoFirewallWG_2022.pdf
Reckon Conf2015 (AU / NZ) Reckon Accounts Hosted - Geek speakv2
Cisco umbrella youtube
Seven steps to better security
Dncybersecurity
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Expand Your Control of Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
Social Distance Your IBM i from Cybersecurity Risk
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
System hardening - OS and Application
What's new in WatchGuard Fireware_v12-7-2.pptx
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
Network Security, Change Control, Outsourcing

Recently uploaded (20)

PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PDF
Salesforce Agentforce AI Implementation.pdf
PDF
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Download FL Studio Crack Latest version 2025 ?
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
Nekopoi APK 2025 free lastest update
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
iTop VPN Crack Latest Version Full Key 2025
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Website Design Services for Small Businesses.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Weekly report ppt - harsh dattuprasad patel.pptx
Salesforce Agentforce AI Implementation.pdf
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
CHAPTER 2 - PM Management and IT Context
Designing Intelligence for the Shop Floor.pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Download FL Studio Crack Latest version 2025 ?
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Digital Systems & Binary Numbers (comprehensive )
Nekopoi APK 2025 free lastest update
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
iTop VPN Crack Latest Version Full Key 2025
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Computer Software and OS of computer science of grade 11.pptx
wealthsignaloriginal-com-DS-text-... (1).pdf
Website Design Services for Small Businesses.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 41

A walk through Windows firewall and Netsh commands

  • 1. A walk through Windows Firewall & Netsh commands Rhydham Joshi M.S. in Software Engineering, San Jose State University Phone : (+1) 408-987-1991 | Email : [email protected] Blog : malwareforensics1.blogspot.com | Linkedin : www.linkedin.com/in/rhydhamjoshi
  • 2. Contents:  Navigation to firewall settings  Firewall Tabs: • Allow an app or feature through firewall • Change notification settings • Turn Windows Firewall on/off • Restore defaults • Advanced settings  Windows Firewall with Advanced Security Tabs:  Activate logging for allowed/denied traffic  Inbound and outbound rules in brief  Monitoring Tab: The things we need to take care about • Firewall • Logs Exploration  Netsh commands  References
  • 3. Navigation to Firewall settings • Control Panel -> System and Security -> Windows Firewall • Run command : firewall.cpl • Type : Windows Firewall in Windows search box.
  • 4. Allow an app or feature through windows firewall • Allow/Deny any app/services in Private/Public network
  • 5. Allow an app or feature through windows firewall
  • 6. Change Notification Settings & Turn Windows Firewall on or off
  • 8. Tabs: Windows Firewall with Advanced Security
  • 9. Activate Logging for allowed/denied traffic
  • 10. • In Domain Profile Tab  Logging  Customize  See the dialog box for “Customize Logging Settings for the Domain Profile” • Click YES for “Log Dropped Packets” & “Log Successful Connections” • Repeat steps for “Private Profile” & “Public Profile” Activate Logging for allowed/denied traffic
  • 11. Inbound Rules and Outbound Rules
  • 20. Monitoring: The thing “WE” need to care about
  • 23. Network shell commands • Import/Export Firewall Settings • Enable Remote Desktop Connection • Enable a program • Enable/disable a port • Enable Remote Management • Allow/Disallow Ping • Change Logging path • Restore Defaults • Enable/disable Windows Firewall • Query Firewall logs
  • 24. Netsh Commands Reference Links: Netsh Commands reference link: https://technet.microsoft.com/en-us/library/cc732279(v=ws.10).aspx Netsh Commands for Windows Firewall: https://technet.microsoft.com/en-us/library/cc771046(v=ws.10).aspx Netsh Commands for Windows Firewall and Advanced Security: https://technet.microsoft.com/en-us/library/cc771920(v=ws.10).aspx Top 10 Netsh firewall commands: http://windowsitpro.com/windows-server/top-10-windows-firewall- netsh-commands