Score:0

Windows Server - create firewall rules from network trace?

kw flag

A good basis for firewall rules would be Zero Trust - only allow what is needed. But in many cases, you do not know all the needed rules for a server connection. As a result in many evironments, the windows firewall is either disabled or poorly managed

I was thinking that maybe this would be a helpful approach:

  1. Install a Windows server with all the needed applications. It is a test setup or you have a snapshot

  2. allow everything

  3. begin working and trace connections

  4. from the connection trace, create firewall rules - I would prefer powershell commands / script

  5. examine the script carefully

  6. maybe apply some commonly known rules (like Ping / ICMP, AD Rules, ...) Most should be managed via GPO / from template

  7. create a new server or revert to snapshot

  8. apply the firewall rules you traced before. These will be the only allowed rules

  9. deny everything else --> Zero Trust

  10. further needed rules are upon failure or request

Does this make sense?

If yes, I would not know how to best capture the traffic and create rules / a script upon it

can anyone help me out?

thanks!

I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.