Windows2008 download application vulnerability, how to block?

  
                

In order to make the computer easy to use, we often download various applications from the Internet. However, in the Windows 2008 system, when some programs are running, our computer firewall will prompt us to “security with the target application”. We generally think that as long as the Windows Server 2008 system is updated in time, it will be fine. This is not the case. The Windows 2008 server system update patch can only block some security vulnerabilities in the system itself, but it does not work for obvious vulnerabilities in applications installed on Windows 2008 systems. In order to prevent application vulnerabilities from being exploited, we should take countermeasures to deal with them as follows:

1. Select Windows2008 "Start”——“Program”——&ldquo ;Administrative Tools”——“Server Manager”option, on the left side of the dialog box, select “Configure”,“Advanced Security Windows Firewall> branch option, click from the target branch ; inbound rules & rdquo; options. (As shown below)

2. Then we click on the “New Rule" option from the "Inbound Rules"> New Rules" option, the system screen will pop up automatically In the wizard window of the inbound rule, select the "Program" option, and click the "Next" button to pop up the settings window, select the "This program path" option in the settings window, and then in the In the following dialog box, enter the full path to the system of the application with the security vulnerability. Of course, we can also quickly find the location of the application by using the “Browse” button. (As shown below)

3. Next we should select the “Block Connection” option (as shown below)

4. Then click the “Next” button to set the current The scope of application of inbound rules, of course, the situation varies from person to person, but in order to ensure security, we will select the three options "Domain, Private, Public". Therefore, when the Windows 2008 system is connected to different networks, any illegal programs cannot exploit the vulnerability of the target application to attack the Windows 2008 system through the network. (As shown below)

5. After completing the above setting operation, we only need to set the name of the current new rule, and click the “Complete” button to save the above creation operation.

The above five simple steps can easily block the application vulnerabilities in the system. We can use the set program to protect our computer from Trojans through the normal use of the network. The program is attacked.

Copyright © Windows knowledge All Rights Reserved