Enabling 'This connection uses the following items' under NIC properties

Posted on 2008-11-13
Last Modified: 2012-05-05
I am using logon script to add some windows firewall ports exception settings on my server 2003 ent edition domain like 'Netsh firewall add portopening tcp XXXX name1" to all my windows xp clients.  For some reason my clients play around with the NIC properties and uncheck 'client for microsoft networks' , 'File and printer sharing' etc What is the command to put into the logon script to enable or check these items which comes under the NIC properites 'This connection uses the following items:
Question by:amanzoor
    LVL 77

    Accepted Solution

    You cannot control that ('client for microsoft networks' , 'File and printer sharing' etc) within a basic logon script, unless possibly with VBS, but you can control it to some degree with Group Policy. Also if the users were not admins of their workstations they should not be able to change NIC options.
    User Configuration | Administrative templates | Network | Network connections | Prohibit Enabling/Disabling components of a LAN connection
    (there are other similar policies in the same 'folder' you may want to look at)

    You can also define the port exceptions within group policy if you like:
    Computer configuration | administrative templates | network | network connections | domain Profile | Windows firewall: Define port exceptions
    The nice thing about group policy is you can define different domain and standard firewall configurations. Standard are applied when the domain is not available, i.e on laptops when out of the office, and you do not want the port exceptions enabled.
    LVL 4

    Author Comment

    Thanks Robwill
    I will look into applying the group policy.  Thanks for your time.
    LVL 77

    Expert Comment

    by:Rob Williams
    You are very welcome, thank you amanzoor. Good luck with it.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    Lets look at the default installation and configuration of FreeProxy 4.10 REQUIREMENTS 1. FreeProxy 4.10 Application - Can be downloaded here ( 2. Ensure that you disable the windows fi…
    If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    8 Experts available now in Live!

    Get 1:1 Help Now