Name | Description |
Active Directory Domain Controller - W32Time (NTP-UDP-In) | Inbound rule for the Active Directory Domain Controller service to allow NTP traffic for the Windows Time service. [UDP 123] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 123 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | w32time |
Allow edge traversal | False |
Group | Active Directory Domain Services |
|
Active Directory Domain Controller (RPC-EPMAP) | Inbound rule for the RPCSS service to allow RPC/TCP traffic to the Active Directory Domain Controller service. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | RPC endpoint mapping |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | rpcss |
Allow edge traversal | False |
Group | Active Directory Domain Services |
|
Kerberos Key Distribution Center - PCR (UDP-In) | Inbound rule for the Kerberos Key Distribution Center service to allow for password change requests. [UDP 464] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\lsass.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 464 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Kerberos Key Distribution Center |
|
Kerberos Key Distribution Center - PCR (TCP-In) | Inbound rule for the Kerberos Key Distribution Center service to allow for password change requests. [TCP 464] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\lsass.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 464 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Kerberos Key Distribution Center |
|
Active Directory Domain Controller (RPC) | Inbound rule to allow remote RPC/TCP access to the Active Directory Domain Controller service. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\lsass.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Active Directory Domain Services |
|
Active Directory Domain Controller - LDAP (UDP-In) | Inbound rule for the Active Directory Domain Controller service to allow remote LDAP traffic. [UDP 389] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\lsass.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 389 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Active Directory Domain Services |
|
Active Directory Domain Controller - LDAP (TCP-In) | Inbound rule for the Active Directory Domain Controller service to allow remote LDAP traffic. [TCP 389] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\lsass.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 389 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Active Directory Domain Services |
|
Active Directory Domain Controller - Secure LDAP (TCP-In) | Inbound rule for the Active Directory Domain Controller service to allow remote Secure LDAP traffic. [TCP 636] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\lsass.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 636 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Active Directory Domain Services |
|
Active Directory Domain Controller - LDAP for Global Catalog (TCP-In) | Inbound rule for the Active Directory Domain Controller service to allow remote Global Catalog traffic. [TCP 3268] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\lsass.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 3268 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Active Directory Domain Services |
|
Active Directory Domain Controller - Secure LDAP for Global Catalog (TCP-In) | Inbound rule for the Active Directory Domain Controller service to allow remote Secure Global Catalog traffic. [TCP 3269] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\lsass.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 3269 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Active Directory Domain Services |
|
DNS (UDP, Incoming) | Inbound rule to allow remote UDP access to the DNS service. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\dns.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 53 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | dns |
Allow edge traversal | False |
Group | DNS Service |
|
DNS (TCP, Incoming) | Inbound rule to allow remote TCP access to the DNS service. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\dns.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 53 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | dns |
Allow edge traversal | False |
Group | DNS Service |
|
File Replication (RPC) | Inbound rule to allow File Replication RPC traffic. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %SystemRoot%\system32\NTFRS.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | NTFRS |
Allow edge traversal | False |
Group | File Replication |
|
Kerberos Key Distribution Center (TCP-In) | Inbound rule for the Kerberos Key Distribution Center service. [TCP 88] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\lsass.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 88 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Kerberos Key Distribution Center |
|
Kerberos Key Distribution Center (UDP-In) | Inbound rule for the Kerberos Key Distribution Center service. [UDP 88] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\lsass.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 88 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Kerberos Key Distribution Center |
|
Active Directory Domain Controller - SAM/LSA (NP-UDP-In) | Inbound rule for the Active Directory Domain Controller service to be remotely managed over Named Pipes. [UDP 445] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 445 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Active Directory Domain Services |
|
Active Directory Domain Controller - SAM/LSA (NP-TCP-In) | Inbound rule for the Active Directory Domain Controller service to be remotely managed over Named Pipes. [TCP 445] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 445 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Active Directory Domain Services |
|
DFS Replication (RPC-In) | Inbound rule to allow DFS Replication RPC traffic. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %SystemRoot%\system32\dfsrs.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | Dfsr |
Allow edge traversal | False |
Group | DFS Replication |
|
Active Directory Domain Controller - Echo Request (ICMPv4-In) | Inbound rule for the Active Directory Domain Controller service to allow Echo requests (ping). |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 1 |
Local port | Any |
Remote port | Any |
ICMP settings | type 8:code any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Active Directory Domain Services |
|
Active Directory Domain Controller - Echo Request (ICMPv6-In) | Inbound rule for the Active Directory Domain Controller service to allow Echo requests (ping). |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 58 |
Local port | Any |
Remote port | Any |
ICMP settings | type 128:code any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Active Directory Domain Services |
|
Active Directory Domain Controller - NetBIOS name resolution (UDP-In) | Inbound rule for the Active Directory Domain Controller service to allow NetBIOS name resolution. [UDP 138] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 138 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Active Directory Domain Services |
|
File and Printer Sharing (NB-Name-In) | Inbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 137 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | File and Printer Sharing |
|
File and Printer Sharing (NB-Session-In) | Inbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 139 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | File and Printer Sharing |
|
Windows Internet Naming Service (WINS) (UDP-In) | Inbound rule for the Windows Internet Naming Service to allow WINS requests. [UDP 42] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %SystemRoot%\System32\wins.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 42 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | WINS |
Allow edge traversal | False |
Group | Windows Internet Naming Service (WINS) |
|
Windows Internet Naming Service (WINS) (TCP-In) | Inbound rule for the Windows Internet Naming Service to allow WINS requests. [TCP 42] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %SystemRoot%\System32\wins.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 42 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | WINS |
Allow edge traversal | False |
Group | Windows Internet Naming Service (WINS) |
|
Windows Internet Naming Service (WINS) - Remote Management (RPC) | Inbound rule for the Windows Internet Naming Service to allow remote management via RPC/TCP. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %SystemRoot%\System32\wins.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | WINS |
Allow edge traversal | False |
Group | Windows Internet Naming Service (WINS) - Remote Management |
|
Core Networking - Destination Unreachable (ICMPv6-In) | Destination Unreachable error messages are sent from any node that a packet traverses which is unable to forward the packet for any reason except congestion. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 58 |
Local port | Any |
Remote port | Any |
ICMP settings | type 1:code any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Core Networking |
|
Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-In) | Destination Unreachable Fragmentation Needed error messages are sent from any node that a packet traverses which is unable to forward the packet because fragmentation was needed and the don't fragment bit was set. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 1 |
Local port | Any |
Remote port | Any |
ICMP settings | type 3:code 4 |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Core Networking |
|
Core Networking - Neighbor Discovery Advertisement (ICMPv6-In) | Neighbor Discovery Advertisement messages are sent by nodes to notify other nodes of link-layer address changes or in response to a Neighbor Discovery Solicitation request. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 58 |
Local port | Any |
Remote port | Any |
ICMP settings | type 136:code any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Core Networking |
|
Core Networking - Neighbor Discovery Solicitation (ICMPv6-In) | Neighbor Discovery Solicitations are sent by nodes to discover the link-layer address of another on-link IPv6 node. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 58 |
Local port | Any |
Remote port | Any |
ICMP settings | type 135:code any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Core Networking |
|
Core Networking - Packet Too Big (ICMPv6-In) | Packet Too Big error messages are sent from any node that a packet traverses which is unable to forward the packet because the packet is too large for the next link. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 58 |
Local port | Any |
Remote port | Any |
ICMP settings | type 2:code any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Core Networking |
|
Core Networking - Parameter Problem (ICMPv6-In) | Parameter Problem error messages are sent by nodes as a result of incorrectly generated packets. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 58 |
Local port | Any |
Remote port | Any |
ICMP settings | type 4:code any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Core Networking |
|
Core Networking - Time Exceeded (ICMPv6-In) | Time Exceeded error messages are generated from any node that a packet traverses if the Hop Limit value is decremented to zero at any point on the path. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 58 |
Local port | Any |
Remote port | Any |
ICMP settings | type 3:code any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Core Networking |
|
Active Directory Web Services (TCP-In) | Inbound rule for the Active Directory Web Services. [TCP] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\ADWS\Microsoft.ActiveDirectory.WebServices.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 9389 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | adws |
Allow edge traversal | False |
Group | Active Directory Web Services |
|
Windows Remote Management (HTTP-In) | Inbound rule for Windows Remote Management via WS-Management. [TCP 5985] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 5985 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Windows Remote Management |
|
Windows Remote Management (HTTPS-In) | Inbound rule for Windows Remote Management via WS-Management. [TCP 5986] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 5986 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Windows Remote Management |
|
Windows Management Instrumentation (WMI-In) | Inbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %SystemRoot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Any |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | winmgmt |
Allow edge traversal | False |
Group | Windows Management Instrumentation (WMI) |
|
Remote Desktop - User Mode (UDP-In) | Inbound rule for the Remote Desktop service to allow RDP traffic. [UDP 3389] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %SystemRoot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 3389 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | termservice |
Allow edge traversal | False |
Group | Remote Desktop |
|
Remote Desktop - User Mode (TCP-In) | Inbound rule for the Remote Desktop service to allow RDP traffic. [TCP 3389] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %SystemRoot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 3389 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | termservice |
Allow edge traversal | False |
Group | Remote Desktop |
|
Remote Desktop (TCP-In) | Inbound rule for the Remote Desktop service to allow RDP traffic. [TCP 3389] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 3389 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Remote Desktop |
|
DFS Management (TCP-In) | Inbound rule for DFS Management to allow the DFS Management service to be remotely managed via DCOM. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\system32\dfsfrsHost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | DFS Management |
|
RPC (TCP, Incoming) | Inbound rule to allow remote RPC/TCP access to the DNS service. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\System32\dns.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | dns |
Allow edge traversal | False |
Group | DNS Service |
|
Windows Backup (RPC) | Inbound rule for the Windows Backup Service to be remotely managed via RPC/TCP |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\system32\wbengine.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | wbengine |
Allow edge traversal | False |
Group | Windows Backup |
|
Performance Logs and Alerts (TCP-In) | Inbound rule for Performance Logs and Alerts traffic. [TCP-In] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\system32\plasrv.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Any |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Performance Logs and Alerts |
|
Remote Event Log Management (RPC) | Inbound rule for the local Event Log service to be remotely managed via RPC/TCP. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %SystemRoot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | Eventlog |
Allow edge traversal | False |
Group | Remote Event Log Management |
|
Remote Scheduled Tasks Management (RPC) | Inbound rule for the Task Scheduler service to be remotely managed via RPC/TCP. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %SystemRoot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | schedule |
Allow edge traversal | False |
Group | Remote Scheduled Tasks Management |
|
Remote Service Management (RPC) | Inbound rule for the local Service Control Manager to be remotely managed via RPC/TCP. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %SystemRoot%\system32\services.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Remote Service Management |
|
COM+ Remote Administration (DCOM-In) | Inbound rule to allow DCOM traffic to the COM+ System Application for remote administration. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %systemroot%\system32\dllhost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | COMSysApp |
Allow edge traversal | False |
Group | COM+ Remote Administration |
|
Windows Defender Firewall Remote Management (RPC) | Inbound rule for the Windows Defender Firewall to be remotely managed via RPC/TCP. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %SystemRoot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | policyagent |
Allow edge traversal | False |
Group | Windows Defender Firewall Remote Management |
|
Remote Volume Management - Virtual Disk Service (RPC) | Inbound rule for the Remote Volume Management - Virtual Disk Service to be remotely managed via RPC/TCP. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %SystemRoot%\system32\vds.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | vds |
Allow edge traversal | False |
Group | Remote Volume Management |
|
Remote Volume Management - Virtual Disk Service Loader (RPC) | Inbound rule for the Remote Volume Management - Virtual Disk Service Loader to be remotely managed via RPC/TCP. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | True |
Program | %SystemRoot%\system32\vdsldr.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Remote Volume Management |
|
OpenSSH SSH Server (sshd) | Inbound rule for OpenSSH SSH Server (sshd) |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %SystemRoot%\system32\OpenSSH\sshd.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 22 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | OpenSSH Server |
|
DHCP Server v4 (UDP-In) | An inbound rule to allow traffic to the IPv4 Dynamic Host Control Protocol Server. [UDP 67] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 67 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | dhcpserver |
Allow edge traversal | False |
Group | DHCP Server |
|
DHCP Server v4 (UDP-In) | An inbound rule to allow traffic so that rogue detection works in V4. [UDP 68] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 68 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | dhcpserver |
Allow edge traversal | False |
Group | DHCP Server |
|
DHCP Server v6 (UDP-In) | An inbound rule to allow traffic so that rogue detection works in V6. [UDP 546] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 546 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | dhcpserver |
Allow edge traversal | False |
Group | DHCP Server |
|
DHCP Server v6 (UDP-In) | An inbound rule to allow traffic to the IPv6 Dynamic Host Control Protocol Server. [UDP 547] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 547 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | dhcpserver |
Allow edge traversal | False |
Group | DHCP Server |
|
DHCP Server Failover (TCP-In) | An inbound rule to allow DHCP failover messages to the IPv4 Dynamic Host Configuration Protocol Server. [TCP 647] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 647 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | dhcpserver |
Allow edge traversal | False |
Group | DHCP Server Management |
|
DHCP Server (RPC-In) | An inbound rule to allow traffic to allow RPC traffic for DHCP Server management. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | dhcpserver |
Allow edge traversal | False |
Group | DHCP Server Management |
|
Network Policy Server (Legacy RADIUS Authentication - UDP-In) | Inbound rule to allow Network Policy Server to receive RADIUS Authentication requests. [UDP 1645] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 1645 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.1.12, 10.220.1.13 |
Profile | All |
Network interface type | All |
Service | ias |
Allow edge traversal | False |
Group | Network Policy Server |
|
Network Policy Server (Legacy RADIUS Accounting - UDP-In) | Inbound rule to allow Network Policy Server to receive RADIUS Accounting requests. [UDP 1646] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 1646 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.1.12, 10.220.1.13 |
Profile | All |
Network interface type | All |
Service | ias |
Allow edge traversal | False |
Group | Network Policy Server |
|
Network Policy Server (RADIUS Authentication - UDP-In) | Inbound rule to allow Network Policy Server to receive RADIUS Authentication requests. [UDP 1812] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 1812 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.1.12, 10.220.1.13 |
Profile | All |
Network interface type | All |
Service | ias |
Allow edge traversal | False |
Group | Network Policy Server |
|
Network Policy Server (RADIUS Accounting - UDP-In) | Inbound rule to allow Network Policy Server to receive RADIUS Accounting requests. [UDP 1813] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | 1813 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.1.12, 10.220.1.13 |
Profile | All |
Network interface type | All |
Service | ias |
Allow edge traversal | False |
Group | Network Policy Server |
|
Network Policy Server (RPC) | Inbound rule for the Network Policy Server to be remotely managed via RPC/TCP. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\iashost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Network Policy Server |
|
World Wide Web Services (HTTP Traffic-In) | An inbound rule to allow HTTP traffic for Internet Information Services (IIS) [TCP 80] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 80 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | World Wide Web Services (HTTP) |
|
World Wide Web Services (HTTPS Traffic-In) | An inbound rule to allow HTTPS traffic for Internet Information Services (IIS) [TCP 443] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 443 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Secure World Wide Web Services (HTTPS) |
|
Windows Deployment Services (UDP-In) | Inbound rule for Windows Deployment Services to allow UDP traffic. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 17 |
Local port | Any |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | WdsServer |
Allow edge traversal | False |
Group | Windows Deployment Services |
|
Windows Deployment Services (RPC-In) | Inbound rule for Windows Deployment Services to allow RPC/TCP traffic. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | WdsServer |
Allow edge traversal | False |
Group | Windows Deployment Services |
|
Key Management Service (TCP-In) | Inbound rule for the Key Management Service to allow for machine counting and license compliance. [TCP 1688] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %SystemRoot%\system32\sppextcomobj.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 1688 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | sppsvc |
Allow edge traversal | False |
Group | Key Management Service |
|
Remote File Server Resource Manager Management - FSRM Service (RPC-In) | Inbound rule for the File Server Resource Manager service to be remotely managed via RPC/TCP. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\svchost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | SrmSvc |
Allow edge traversal | False |
Group | Remote File Server Resource Manager Management |
|
Remote File Server Resource Manager Management - FSRM Reports Service (RPC-In) | Inbound rule for the File Server Storage Reports Manager service to be remotely managed via RPC/TCP. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %systemroot%\system32\srmhost.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.3.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | SrmReports |
Allow edge traversal | False |
Group | Remote File Server Resource Manager Management |
|
File and Printer Sharing (Spooler Service - RPC) | Inbound rule for File and Printer Sharing to allow the Print Spooler Service to communicate via TCP/RPC. |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | %SystemRoot%\system32\spoolsv.exe |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | Dynamic RPC |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | 10.220.1.0/255.255.255.0, 10.220.2.0/255.255.255.0, 10.220.3.0/255.255.255.0, 10.220.4.0/255.255.255.0, 10.220.5.0/255.255.255.0, 10.220.6.0/255.255.255.0 |
Profile | All |
Network interface type | All |
Service | Spooler |
Allow edge traversal | False |
Group | File and Printer Sharing |
|
Windows Server Update Services (HTTP-In) | Inbound rule for Windows Server Update Services to allow HTTP traffic. [TCP 8530] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 8530 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Windows Server Update Services (WSUS) |
|
Windows Server Update Services (HTTPS-In) | Inbound rule for Windows Server Update Services to allow HTTPS traffic. [TCP 8531] |
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module | |
Enabled | False |
Program | System |
Action | Allow |
Security | Require authentication |
Authorized computers | |
Authorized users | |
Protocol | 6 |
Local port | 8531 |
Remote port | Any |
ICMP settings | Any |
Local scope | Any |
Remote scope | Any |
Profile | All |
Network interface type | All |
Service | All programs and services |
Allow edge traversal | False |
Group | Windows Server Update Services (WSUS) |
|