Solved

How to command-modify my firewall rule?  Win 2008 Adv Firewall

Posted on 2012-03-19
4
586 Views
Last Modified: 2015-03-04
Advanced Firewall on Windows 2008 R2 server

GIven my firewall rule:  BlockSpammers

How can I add an IP address to the scope via a command line, script, etc...other than going into the GUI?

I see no way to modify a rule with netsh advfirewall.   Can someone post me an example of modifying a FW rule (adding an IP to its scope) using a script?

Thanks!
0
Comment
Question by:arthurh88
4 Comments
 
LVL 8

Expert Comment

by:barrykfl
Comment Utility
0
 

Author Comment

by:arthurh88
Comment Utility
but i already mentioned netsh in my question.  i can find no example of netsh to add an IP to the scope of an existing rule.  do you have an example?
0
 
LVL 38

Accepted Solution

by:
ChiefIT earned 500 total points
Comment Utility
The problem with a spammer is they use spam bots on a botnet to spam others. This does two things for a spammer:

1) hides their true identity by using a victimized computer from an unsuspecting person within the botnet
2) makes it difficult to make an IP based filter to filter out spammers.

Your best bet is to buy a hardware spam filtering solution like a mxgaurddog, or mailwasher. This views the subject and often the text of a message to determine if it follows certain text and patters of a known spam..

Hiding behind an IP filter of a firewall is really not going to help you in many cases, UNLESS all you use your email for is INTERNAL MAIL. Then you can block all external mail from entering into your network from external sources.
0
 

Expert Comment

by:Ben Conner
Comment Utility
While this has already been closed, can anyone provide a sample netsh command requested by the original poster?  There are other reasons one might want this capability.

Thanks!

--Ben
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will walk an individual through the steps necessary to install and configure the Windows Server Backup Utility. Directly connect an external storage device such as a USB drive, or CD\DVD burner: If the device is a USB drive, ensure i…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now