Solved

Enable XP Firewall remotely

Posted on 2004-08-06
5
170 Views
Last Modified: 2013-12-04
Group Policy has a way of not using the xp firewall when on the domain.
before you set this setting, you can tun the firewall on, then after you apply this and they connect to the domain, it disables the firewall only when connected to the domain.  this way laptops are protected when connected at home on DSL or at airports.

I need a way to enable the xp firewall remotely and apply the above policy.  It would be a lot of work to visit all laptops we have.

you can enable the xp firewall through gpo, but it cancels out the "prohibit use of xp firewall while on domain".
can't have that...

THanks,
Charles
0
Comment
Question by:chaldz
  • 2
5 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 125 total points
ID: 11741577
Service pack 2 for XP will enable the FW by default- even on the lan... but it's not "concrete" in this article
http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/sp2netwk.mspx#XSLTsection130121120120

These are the old (xp sp1) setting definitions
The firewall turns off when a VPN connection is made BTW... so dsl/cable users are without a fw if you rely on XP ICF... ZoneAlarm is free, and a slightly better firewall
http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/xpmanaged/33_xpape.mspx

Prohibit Use of Internet Connection Firewall on your DNS domain network (enabled)
 If you enable this policy setting, Internet Connection Firewall cannot be enabled or configured by users (including administrators), and the Internet Connection Firewall service cannot run on the computer. The option to enable the Internet Connection Firewall through the Advanced tab is removed. In addition, the Internet Connection Firewall is not enabled for remote access connections created through the Make New Connection Wizard.
 
Prohibit Use of Internet Connection Firewall on your DNS domain network (disabled or not configured)
If you disable this policy setting or do not configure it, the Internet Connection Firewall is disabled when a LAN connection or virtual private network (VPN) connection is created, but users can use the Advanced tab in the connection properties to enable it. The Internet Connection Firewall is enabled by default on the connection for which Internet Connection Sharing is enabled. In addition, remote access connections created through the Make New Connection Wizard have the Internet Connection Firewall enabled.

These are the regisrty entries that change when the firewall is enabled through the NIC properties (not sure if it's just one or all of them)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG
Seed REG_BINARY 4F8CAF88FA1D3780CD404F3EB568E0C1FF7AC2D9CB7DE82C6661593EFEB33B0AF7CD724DEF57E72971C448554D500FDD1C9A594691EAB731051AF604DC1C6893D11ED09B6CCDE71C509031CBFDBBE6DB (enabled)
B5F1C06FAD9E95CF6B51416886780E1F7A0DEF91439DB5378EC8361FE62972B22E7D8EB12BE79F8F265A08B97BF2F4E666DA3017F8D94BF9ED72BBE9E4DD11C3F934640A6CCD40D5D8CEA865DD5AF285 (disabled)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-19
RefCount REG_DWORD 0x00000001 [1] (disabled)
RefCount REG_DWORD 0x00000002 [2] (enabled)
HKEY_USERS\S-1-5-21-1275210071-854245398-1957994488-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count
HRZR_EHAPCY REG_BINARY 1f 01 00 00 06 00 00 00 40 13 ea ca 37 7c c4 01 (enabled)
HRZR_EHAPCY REG_BINARY 1f 01 00 00 07 00 00 00 30 66 fc 0a 39  7c c4 01 (disabled)
HRZR_EHAPCY:APCN.PCY REG_BINARY 1f 01 00 00 06 00 00 00 40 13 ea ca 37 7c c4 01  (enabled)
HRZR_EHAPCY:APCN.PCY REG_BINARY 1f 01 00 00 07 00 00 00 30 66 fc 0a 39 7c c4 01  (disabled)
HKEY_USERS\S-1-5-21-1275210071-854245398-1957994488-1003\Software\Microsoft\Windows\ShellNoRoam\BagMRU\0
MRUListEX REG_BINARY 00 00 00 00 03 00 00 00 01 00 00 00 02 00 00 00 ff ff ff ff (enabled
MRUListEX REG_BINARY 03 00 00 00 03 00 00 00 01 00 00 00 02 00 00 00 ff ff ff ff (disabled)

And these changed when I disabled it again:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\ServiceCurrent
[Default] REG_DWORD 0x00000017 (23) (enabled)
[Default] REG_DWORD 0x00000018 (24) (disabled)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ServiceCurrent
[Default] REG_DWORD 0x00000017 (23) (enabled)
[Default] REG_DWORD 0x00000018 (24) (disabled)
-rich
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 13958824
I think I answered the question.
-rich
0

Featured Post

Get up to 2TB FREE CLOUD per backup license!

An exclusive Black Friday offer just for Expert Exchange audience! Buy any of our top-rated backup solutions & get up to 2TB free cloud per system! Perform local & cloud backup in the same step, and restore instantly—anytime, anywhere. Grab this deal now before it disappears!

Join & Write a Comment

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now