?
Solved

Enable or disable server 2008 firewall after installation

Posted on 2014-01-20
3
Medium Priority
?
231 Views
Last Modified: 2014-02-17
Hello,

Over the weekend I've made changes to an exchange server, all went well but when I was setting it up I noticed the Windows firewall was disabled. So I enabled it and opened the ports I needed,  
Today I get a call that some software package isn't working anymore, I immediately thought that the firewall might be blocking it, and I was right, disabling the firewall fixed it.
I asked the software provider to give me a list of the ports I need to open to make their software work, but they tell me they  always just disable the firewall..
What is the best practice here? Ok, there is a router behind the server running NAT but I always tend to enable the firewall and just configure it correctly.

What is your opinion?
0
Comment
Question by:Benderama
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 13

Accepted Solution

by:
Alex Green earned 1000 total points
ID: 39793626
On an internal network it's normally best to have the firewall disabled mainly for this reason. Plus you have a hardware firewall blocking the network from the internet so it'll be harder to get through that firewall than your windows firewall.

If however you still want to find the ports, either use NETSTAT or go into your resource monitor (task manager, then performance, button in there) and see what ports it's using and then use group policy to enforce your firewall rules.
0
 
LVL 59

Assisted Solution

by:Cliff Galiher
Cliff Galiher earned 1000 total points
ID: 39793712
I couldn't disagree more, a host-based firewall can stop blended threats that can get by a network firewall. Just look at the Java/yahoo issue a few weeks ago as an example.

In the same place where you can enable or disable the firewall, you can turn on logging for denied packets. Turn on logging, fire up the app and let it fail, then turn logging off. You now have a nice file with some blocked traffic to create a new rule. You may have to do this process multiple times if the app creates secondary connections only after a successful primary connection, as they'd still be blocked, but would not have been attempted during your first capture.

So rinse and repeat. Create a rule, test. If it fails, capture again. It is usually pretty easy to get good firewall rules that allow an app to work while still protecting the host.
0
 

Author Closing Comment

by:Benderama
ID: 39865666
2 reactions, 2 diffrent opinions... well I chose to enable to firewall and set it up like it should be imo..
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

You might have come across a situation when you have Exchange 2013 server in two different sites (Production and DR). After adding the Database copy in ECP console it displays Database copy status unknown for the DR exchange server. Issue is strange…
For anyone that has accidentally used newSID with Server 2008 R2 (like I did) and hasn't been able to get the server running again because you were unlucky (as I was) and had no backups - I was able to get things working by doing a Registry Hive rec…
This tutorial will give a an overview on how to deploy remote agents in Backup Exec 2012 to new servers. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as connecting to a remote Back…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Suggested Courses

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question