Secure Your Windows 10 PC with Advanced Firewall and Network Monitoring Policies

Secure Your Windows 10 PC with Advanced Firewall and Network Monitoring Policies

Understanding the Importance of Firewall Protection

In today’s digital landscape, where cyber threats are constantly evolving, securing your Windows 10 PC is of utmost importance. While the perimeter-based security approach has traditionally focused on protecting the network edge, the rise of mobile computing and the ease of user-targeted attacks have made it crucial to delve deeper into securing the inner workings of your network.

The Windows Defender Firewall, included in every Windows machine, is a powerful tool that can help you fortify your system against unauthorized access and malicious traffic. By leveraging the advanced firewall settings and implementing comprehensive network monitoring policies, you can significantly enhance the security of your Windows 10 PC and mitigate the risk of data breaches, lateral movement, and other cyber attacks.

Blocking Inbound SMB Traffic

One of the primary steps in securing your Windows 10 PC is to block inbound Server Message Block (SMB) traffic. SMB is a widely used network file sharing protocol, and it can be a prime target for attackers. By default, the Windows Defender Firewall blocks inbound SMB traffic (TCP port 445) from the internet, but it allows outbound SMB connections.

To further tighten the security, you should create a new firewall rule to block all inbound SMB traffic, regardless of the network profile (Domain, Private, or Public). This rule can be applied to Windows clients and servers that do not host SMB shares, effectively preventing remote connections from malicious or compromised devices.

Name: Block all inbound SMB 445
Description: Blocks all inbound SMB TCP 445 traffic. Not to be applied to domain controllers or computers that host SMB shares.
Action: Block the connection
Programs: All
Remote Computers: Any
Protocol Type: TCP
Local Port: 445
Remote Port: Any
Profiles: All
Scope (Local IP Address): Any
Scope (Remote IP Address): Any
Edge Traversal: Block edge traversal

It’s important to note that you should not apply this rule to domain controllers or file servers, as they require inbound SMB traffic to perform their essential functions. Instead, you can restrict access to these critical systems from trusted IP ranges and devices to lower their attack surface.

Controlling Outbound SMB Connections

While blocking inbound SMB traffic is crucial, you also need to control outbound SMB connections to prevent lateral movement and data exfiltration within your network. By default, Windows clients and servers have no restrictions on outbound SMB connections, so you’ll need to create new firewall rules to address this.

For untrusted (Guest/Public) networks, you can create a rule to block all outbound SMB traffic (TCP port 445):

Name: Block outbound Guest/Public SMB 445
Description: Blocks all outbound SMB TCP 445 traffic when on an untrusted network
Action: Block the connection
Programs: All
Remote Computers: Any
Protocol Type: TCP
Local Port: Any
Remote Port: 445
Profiles: Guest/Public
Scope (Local IP Address): Any
Scope (Remote IP Address): Any
Edge Traversal: Block edge traversal

For trusted (Private/Domain) networks, you can create two rules:

  1. Allow outbound SMB to domain controllers and file servers:
    Name: Allow outbound Domain/Private SMB 445
    Description: Allows outbound SMB TCP 445 traffic to only DCs and file servers when on a trusted network
    Action: Allow the connection if it is secure
    Customize Allow if Secure Settings: pick one of the options, set Override block rules = ON
    Programs: All
    Protocol Type: TCP
    Local Port: Any
    Remote Port: 445
    Profiles: Private/Domain
    Scope (Local IP Address): Any
    Scope (Remote IP Address): Edge Traversal: Block edge traversal

  2. Block all other outbound SMB connections:
    Name: Block outbound Domain/Private SMB 445
    Description: Blocks outbound SMB TCP 445 traffic. Override by using the "Allow outbound Domain/Private SMB 445" rule
    Action: Block the connection
    Programs: All
    Remote Computers: N/A
    Protocol Type: TCP
    Local Port: Any
    Remote Port: 445
    Profiles: Private/Domain
    Scope (Local IP Address): Any
    Scope (Remote IP Address): N/A
    Edge Traversal: Block edge traversal

Remember, you must also create a security connection rule to implement the “Allow the connection if it is secure” and “Allow the connection to use null encapsulation” settings. If you do not set this rule on all Windows-based and Windows Server-based computers, authentication will fail, and SMB will be blocked outbound.

Disabling SMB Server Service for Enhanced Security

For consumer or highly isolated, managed computers that do not require SMB at all, you can take an even more proactive approach by disabling the Server or Workstation services. This effectively prevents the system from making outbound SMB connections or receiving inbound SMB traffic.

To do this, you can use the “Services” snap-in (Services.msc) or the PowerShell Set-Service cmdlet. However, it’s crucial to note that you must not disable these services on domain controllers or file servers, as it would prevent clients from applying group policy or connecting to their data.

Monitoring and Auditing SMB Activity

To gain visibility into your SMB activity and identify any potential anomalies, you can enable SMB auditing on your Windows devices. This feature, available since Windows Vista and Windows Server 2008, allows you to track inbound SMB access and create an audit trail.

To enable SMB auditing, you can configure the following Group Policy settings:

Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > Object Access > Audit File Share

This audit trail can help you understand which nodes are communicating over SMB, allowing you to identify unused or suspicious shares and take appropriate action to mitigate the risks.

Comprehensive Firewall and Network Monitoring Strategy

Securing your Windows 10 PC requires a comprehensive approach that goes beyond just blocking inbound SMB traffic. By implementing a layered security strategy that includes advanced firewall rules, disabling unnecessary SMB services, and monitoring SMB activity, you can significantly enhance the overall security of your system and network.

Remember, securing your Windows 10 PC is an ongoing process, as cyber threats are constantly evolving. Regularly review and update your firewall and network monitoring policies to stay ahead of the curve and protect your valuable data and resources.

For more information on Windows Defender Firewall configuration and advanced security strategies, be sure to visit the ITFix blog for additional resources and expert insights.

Facebook
Pinterest
Twitter
LinkedIn

Newsletter

Signup our newsletter to get update information, news, insight or promotions.

Latest Post