Solved

Firewall for many application and softwares

Posted on 2013-02-06
4
188 Views
Last Modified: 2013-02-17
Dear All,

I have list of applications and servers installed in windows 2008 and windows 2008 R2, such as:
•      Exchange 2007
•      Exchange 2010
•      SCCM 2007
•      SCOM 2007
•      SQL 2005
•      SQL 2008

And a lot more.

Now I got a request from management to make all windows firewall on in all servers, I should enable windows firewall using GPO in DC's.

I need your help to do this tasks, now I know which rules or ports i have to open for each server? What I have to allow so the work will not stop?

Please help
0
Comment
Question by:Rhala
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 10

Assisted Solution

by:Prashant Girennavar
Prashant Girennavar earned 250 total points
ID: 38858771
0
 
LVL 10

Accepted Solution

by:
jmanishbabu earned 250 total points
ID: 38858783
0
 
LVL 10

Expert Comment

by:Pramod Ubhe
ID: 38858859
best approach for this is to test the effect of enabling firewall in a test environment or it will have a significant impact on your servers. Most of the applications will stop communicating if you do not exclude correct ports.
0
 
LVL 48

Expert Comment

by:PortletPaul
ID: 38859006
AND, not all installed applications follow default use of ports - your organisation could have its own standards that override product defaults
0

Featured Post

Free eBook: Backup on AWS

Everything you need to know about backup and disaster recovery with AWS, for FREE!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question