Use firewall to make Windows Vista network more secure

Source: Internet
Author: User
Tags change settings

In Windows Vista, how can we better protect network security? You can use the firewall that comes with Vista to implement most security measures.

1. Use the firewall to make remote maintenance more secure

When using Internet shared bandwidth (ADSL) for dial-up Internet access, many network administrators prefer to use the remote desktop function to remotely manage and maintain other computers in the LAN, so as to improve the efficiency of network management and maintenance. However, we know that using the Remote Desktop function at Will is easy for illegal attackers to attack local computers and provide a "channel" for intrusion. If we can find a way for Vista to protect the access security of this "channel, therefore, the security of the network administrator using this "channel" for remote maintenance will be greatly improved. To enable the firewall to protect the security of remote maintenance operations, follow these steps:

First, on the Vista computer system desktop, click the "Start", "set", and "network connection" menu options one by one with the mouse, find the target ADSL connection icon in the network connection interface that appears, right-click the icon, and choose "properties" from the shortcut menu to open the User Account Control Interface, click "continue" to go to the target Connection Properties window;

In the Properties window, click the "share" tab to open the option settings page shown in 1, and select the "allow other network users to connect through the Internet connection of this computer" project on this page, click "Settings" to go to the Advanced Settings page;

Select the "Remote Desktop" option on the Advanced Settings page, and click "OK" to exit the Advanced Settings page of the target network connection, as a result, the network administrator will use the Remote Desktop function to manage and maintain other workstations in the LAN in the future, and the security will be significantly guaranteed.

2. Use the firewall to prevent illegal Ping attacks

We know that each time a Ping command test packet is sent to the target host, the target host consumes a certain amount of system resources for response, if tens of thousands of test data packets are sent to the target host at the same time, the target host requires a considerable amount of system resources to reply to these test requests. To a certain extent, the limited system resources of the target host may be exhausted. Many viruses or hackers in the network often perform Ping command attacks on the target host through the above methods, resulting in paralysis of the target host. To prevent illegal Ping commands from attacking the local Vista workstation system, we can cleverly set the built-in firewall of the system to prevent the local workstation from responding to Ping command requests from the network, so as to avoid Ping command Attacks:

First, log on to the local Vista workstation system with a privileged account, and click "start", "set", and "Control Panel" menu options to open the control panel window of the local system, click the "system and maintenance" option in the window, and then click the "Management Tools" option on the system maintenance interface to open the management tools List window;

In the management tools List window, double-click the "Advanced Security Windows Firewall" option. When the system prompts the user account control window, click the "continue" button, go to the advanced firewall security settings page of the local workstation system;

Select the "inbound rules" item in the list area on the left of the Setting interface, right-click it, and execute the "new rule" command from the shortcut menu that appears, A new rule creation wizard window is displayed. Select the "Custom" option in the window and click "Next, select the "All Programs" option on the page;

When a prompt appears in the Wizard window asking which network protocols and communication ports to apply the new rule, we must select the "ICMPv4" option and then click "Next, next, the new rule creation wizard requires us to select the appropriate connection conditions. In this case, we should select "block connection" (2) and set the specific occasions for applying the new rule, finally, name the new rule and restart the local workstation system. In this way, the local workstation rejects the Ping command requests from the network, in this way, the Vista workstation system will not be attacked by illegal Ping commands. 3. Use the firewall to protect network printing security

We know that Vista's built-in system firewall is often automatically enabled by default, and it does not impose any restrictions on network printing. However, when multiple people share the same printer, in order to prevent illegal users from secretly using the network printer during off-duty or other holidays, the office costs may increase, we can completely disable the illegal use of printers through the network by setting the system firewall that comes with Vista:

First, use a privileged account to access the Vista workstation system that is directly connected to the shared printer. Double-click the "network" icon on the system desktop, click the "Network and sharing center" option in the subsequent interface to open the network and sharing center management interface of the local computer;

Click the "Windows Firewall" project in the list area on the left of the interface to open the Windows Firewall management interface, and click "change settings" under the "Windows Firewall Enabled" setting item on the interface, when the User Account Control Window prompt appears, click the "continue" button to open the Windows Firewall parameter settings interface;

Click the "exceptions" tab on the firewall parameter settings page to go to the option settings page shown in 3. deselect the "file and printer sharing" project selected status, click the "OK" button to end the firewall parameter setting operation. In this way, any user in the LAN attempts to access the shared printer through the network will be rejected by the Vista Firewall.

4. Use the firewall to record illegal attack traces

To avoid network viruses or Trojan Horse attacks, many of our friends will try to install anti-virus software or firewall in the local computer system. However, in many cases, we have no anti-virus software or firewall available, in this case, we only have to try to use the built-in network firewall. In fact, by cleverly enabling the record function of the firewall, we can enable the Vista Firewall to better guard us. any traces of attempts to attack the local system will be quietly captured and recorded by the firewall, then, we only need to open its log records to find all kinds of security threats and take effective measures to prevent them. When you enable the logging function of the firewall, follow these steps:

First, enter the local Vista computer system with a privileged account, click Start and run commands on the system desktop one by one, open the system run text box, and execute gpedit. msc string command to open the Group Policy editing interface of the local computer;

In the left-side area of the page, expand the "Computer Configuration" branch project with the mouse, and click "manage template", "Windows components", and "WindowsDefender" under the Branch one by one, under the "WindowsDefender" subitem, double-click the "enable record-known correct detection" option and select the "enabled" item on the interface, in this way, the Vista Firewall can automatically detect known correct files and record the detection results;

Similarly, open the "enable record unknown detection" attribute setting window under the "WindowsDefender" subitem, and select the "enabled" item on the page, in this way, the Vista Firewall automatically detects unknown files and records the detection results. In the future, we can view relevant log records to find various security threats hidden in the local computer system.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.