Windows Firewall Demo Part 3

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

3 hours 20 minutes
Video Transcription
Hey, everybody. My name is Peter Simple own. And this is the network Security course. This is going to be module six, Lesson four.
So far, the prerequisites for this course and everything we've seen so far are modules one through five module one being the intro module to being this core cybersecurity principles Module three being select applications
Module four, being designed on and network topology structures with principles and security protocols.
Module five is where we took a look at malware and designing of applications and module six, where we took a look at computer protection components and network protection components. And less than three was the first part of the Windows firewall demo.
So if you have not seen any of these yet, I encourage you to go back
and take a look at them. If you have not seen Module six lesson three, then you really need to go back and see that one. Because that is the first part of the Windows firewall demo where I show you the different the layout of the Windows firewall and where everything is located and how it functions
in this video. We are going to do the second part of that Windows firewall demo. We are going to create a program which will we're going to create a far wall policy to show you how to create one and how to ensure that it works.
We have a lot to do today, so let's get started.
All right, here we are, everybody. We're back here in the advanced security section off the Windows firewall, and we are going to go ahead and create a new rule. So for the purpose of this demo, and to show how it works,
we're going to create an outbound rule which, which blocks our own access
to go outside of the computer. So for this example, we're going to block access to the Internet. Although with inbound up our rules, they're put together the same way.
So where you will come over here in our outbound rule section, we will come here to the new rule,
and we will click that. And then it gives us a couple of options so
we can block by a specific program. We can create the type of rule either with the port, whatever port you want want to be Remember, there are 65,535 ports and you can do a pre defined one, which gives you
some programs and services which are currently running on the PC. Or you can do a custom one which you could make it at that point, anything you want.
So for the purpose of this demo, we are going to block a program.
So we're going to hear we select program,
and we gotta figure out who on the block, all programs or just one program in particular. And so we're gonna block one program in particular. We're going to block Google Crume.
Now, before we go any further, I just want to test to show you that Google Chrome is actually working as expected. So we want to go down here to yahoo dot com. We can pull that up and boom! Look at that. We are on the Internet,
So Google Chrome is currently working and now we are going to block it. So this program path, we have to come in to browse. As you could see, I'm already here. But if we if we weren't we could go to computer
the operating system. When you go to the program files, we would come down to Google
and we will go to chrome
application And this is the group gold Chrome execute herbal. So every time you click on, like the desktop icon or something like that this execute herbal program runs
So now that we haven't selected clicking as you can see, it has been set up here
we can click next.
And what are we gonna do? Do want to allow the connection doing to allow it If it is secure or do on a block In our case, we are going to block it. So we're gonna block our own access to Google Chrome.
That's good Here. So this and when we want to apply this rule, do on apply when we're using the domain firewall, the private firewall or the public network firewall. In this case, it doesn't really matter. So we're gonna leave all of these checks.
But if you wanted it applied to the public one but not the private one or so forth, then you can specify that here.
So now we have to give a name. Weaken, call this
test one
and we will finish.
So as you can see,
we are back here from minimize this. As you can see, we now have our far wall test one appearing in the outbound rules, and there's no group attached to it. It applies to all the profiles.
It is enabled, and this job is to block the program at this, um, path.
So let's test it out and see if we did it correctly so it would come down here
Google Chrome
And let's check out yahoo dot com. Uh, we can no longer get to yahoo dot com because the Internet access has been blocked.
Let's try another one for good. ESPN ketchup on our sports when that's blocked. Two is because the far wall is blocking Google chrome from going
going out to the Internet. Now to show you that it's Google Chrome being blocked and not the Internet itself. We can come down here to Internet explore
on that we can
quick on all this
and then we can go suit, not E s p n
dot com.
We let it load.
And then, as you can see, we're now on ESPN dot com and we can catch up on all of our sports.
So that is the first demo. We will also while also walk you through one mawr demo to show you how another way you can block the firewall. So if we close this down here first, let's get rid of this.
We can delete this.
Yes. All right, Now let's go back to new rule.
Now, I'm gonna walk you through the second way. This can be done, but I will not actually go through with it as you convince, you will see in a minute. So instead of blocking a program, we can also block ports. This is very popular way of doing it because you definitely want to disable unused ports
if message is not as much as you possibly can.
So this is a critical aspect of device hardening. So with the ports, we can come down here, block it here, and we can hit next,
and we can specify. Does this one? Do we want to apply this to TCP or UDP?
And once we'd figure out which one we want to do. We can specify all the remote ports or specific ports in general. So this is where you would literally reports. So if I specified Poritz 80
and 443 Now, these airports Http and Https. So these are the ports that are used to get Internet access. So if I hit next here,
I can block the connection,
and I can have it apply to all of the domains,
and I can give a name and then hit finish. I will not hit finish, because the way I am currently re moated into this computer in my home lab. I am re moated in over the Internet. So if I was to click, finish this rule be applied, and I would lose connection to the Internet and I wouldn't be able to get any Aaron head at all.
So that would that would be the end of this demo very quickly.
So we're not going to actually do that. But that is how you would do that. That is how you would block ports if you wanted to.
So this concludes the second half off the windows Far wall demo. I hope you guys learned a lot in this demo and I will see next time
Up Next