Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Windows 2012/2008 server - Windows Firewall: is it possible to block Internet traffic only for third-party programs?

Posted on 2014-02-24
2
637 Views
Last Modified: 2014-02-24
Is it possible, with Windows Firewall in Windows 2012 or 2008, to block all inbound and outbound Internet traffic only for third-party programs?
(Microsoft/Windows programs must have full access to Internet)
0
Comment
Question by:lucavilla
2 Comments
 
LVL 9

Accepted Solution

by:
Sean earned 500 total points
ID: 39883721
you would need to create a program rule for every program you don't want blocked. Or do it in reverse and block all except the programs you want to allow access for.
0
 
LVL 36

Expert Comment

by:Mahesh
ID: 39883912
By default windows firewall never allows 3rd party traffic to passed.

When you install 3rd party software's and if they are using custom ports for communications such as torrent software's, while installing they will ask you to allow certain exceptions in firewall, if you do not allow those exceptions, they will remain blocked

The best practise is to deploy GPO with required firewall restrictions and enforce the same on computers so that applications cannot modify it in stealth mode during installation.

You can find it at computer configuration\windows settings\security settings\windows firewall with advanced security

Mahesh
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I don't know if many of you have made the great mistake of using the Cisco Thin Client model with the management software VXC. If you have then you are probably more then familiar with the incredibly clunky interface, the numerous work arounds, and …
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question