Vista's own firewall to achieve security against

  
Windows Vista how to better protect network security? Most security can be achieved with Vista's own firewall.

1, use a firewall, so that remote maintenance
more secure when shared ADSL dial-up Internet access, many network administrators always like to remotely manage and maintain other computers on the LAN through a remote desktop feature for Improve the efficiency of network management and maintenance. However, we know that using the remote desktop function at will, it is easy for an attacker to attack the local computer to provide an intrusion "channel". If we can find a way to let the Vista system protect the security of this "channel", then the network administrator can use this The security of the "channel" for remote maintenance operations is greatly improved. To allow the firewall to protect the security of remote maintenance operations, we can follow the steps below:
First, in the Vista computer system desktop, click the "Start", "Settings", "Network Connections" menu options one by one with the mouse. In the network connection interface that appears, find the target ADSL connection icon, and right-click the icon with the mouse, then select the “Properties” command in the right-click menu to open the user account control interface, click the “Continue” button to enter the target connection. Properties window;
Click the "Share" tab in the properties window to open the option settings page shown in Figure 1, and the "Allow other network users to connect via this computer's Internet connection" item on the page. Select and click the "Settings" button to enter the advanced settings interface;
Select the "Remote Desktop" option in the advanced settings interface, and then click the "OK" button to exit the target network connection advanced settings interface, so Once the network administrator uses the remote desktop function to manage the other workstations on the LAN. When, security will be significantly guaranteed.
2, use the firewall to prevent illegal ping attacks
We know that each time the ping command test packet is sent to the target host, the target host needs to use a certain amount of system resources to respond to the reply, if at some point When the target host sends thousands of test packets, the target host needs to consume a considerable amount of system resources to reply to these test requests. After reaching a certain level, the limited system resources of the target host may be exhausted. Many viruses or hackers in the network often use the above methods to implement ping command attacks on the target host, which causes the target host to fail. To prevent the illegal ping command from attacking the local Vista workstation system, we can skillfully set the system's own The firewall, in order to prevent the local workstation from responding to the Ping command request from the network, so that the Ping command can be avoided:
First enter the local Vista workstation system with a privileged account, and then click "Start" /"Settings" /"Control Panel" menu option, open the control panel window of the local system, click the "System and Maintenance" option in the window, and click the "Administrative Tools" option in the subsequent system maintenance interface to open Manage tool list window;
Double-click the "Advanced Security Windows Firewall" option in the management tool list window. When the system pops up the user account control window prompt, click the "Continue" button to enter the advanced firewall security of the local workstation system. Setting interface;
check the setting interface In the side list area, click the "Inbound Rules" item, and right-click it to execute the "New Rule" command from the pop-up shortcut menu. A new rule creation wizard window will pop up on the screen. The "Define" option is selected, click on the "Next" button, and select the "All Programs" option in the subsequent interface;
When the wizard window pops up, ask which network protocols and communication ports to apply the new rules to. In the middle, we must select the "ICMPv4" option, and then continue to click the "Next" button, then the new rule creation wizard will ask us to choose the appropriate connection conditions, then we should select "block connection" (Figure 2 Show), set the specific application of the new rule at the same time, and finally name the new rule with an appropriate name, and restart the local workstation system, so that the local workstation will refuse to answer each ping from the network. The command is requested, so that the Vista workstation system will not be attacked by the illegal ping command.
3, the use of firewalls to protect network printing security
We know that Vista's own system firewall is often automatically enabled by default, and it does not impose any restrictions on network printing. However, in the case of multiple people sharing the same printer, in order to prevent illegal users from using the network printer after work or other holiday time, resulting in higher office costs, we can completely set up Vista's own system firewall to achieve It is forbidden to use the printer illegally through the network:
First enter the Vista workstation system that is directly connected to the shared printer with a privileged account, double-click the "Network" icon in the system desktop, and click in the subsequent interface. Network and Sharing Center option, open the network and sharing center management interface of the local computer;
Click the "Windows Firewall" item in the list area on the left side of the interface to open the Windows Firewall management interface, where "Windows Firewall has been When the setting item is enabled, click the "Change Settings" item. When the user account control window prompts, click the "Continue" button to open the parameter setting interface of the Windows Firewall;
click "Firewall parameter setting interface" Exceptions tab, enter the figure as shown The option setting page shown in 3, cancel the "File and Printer Sharing" item selected state, and then click the "OK" button to end the firewall parameter setting operation, so that any user on the LAN tries to access the shared printer over the network. Will be rejected by the Vista firewall.
4, use the firewall to record illegal attacks
In order to avoid network viruses or Trojan attacks, many friends will find ways to install anti-virus software or firewall in the local computer system, but in many cases, we do not have anti-virus on hand Software or firewall is available, in this case we only have to find a way to use the network firewall that comes with the system. In fact, cleverly enabling the logging function of the firewall, we can make the Vista firewall better "stand guard" for us. Any traces of attempts to attack the local system will be quietly captured and recorded by the firewall. We just need to open its log record. All kinds of security threats can be found out, and effective measures can be taken to prevent them. When enabling the logging function of the firewall, we can proceed as follows:
First enter the local Vista computer system with a privileged account, and click the "Start" and "Run" commands in the system desktop with the mouse to open The system runs a text box in which the "gpedit.msc" string command is executed to open the group policy editing interface of the local computer;
from the left side of the interface to display the area, use the mouse to expand the "computer configuration" branch item, and Under the branch, click the "Administrative Templates", "Windows Components", "WindowsDefender" sub-items, and double-click the "Enable Logging Known Correct Detection" option under the "WindowsDefender" sub-item. In the subsequent interface, "Enable" "The project is selected, so that the Vista firewall can automatically detect the known correct files and record the detection results;
Similarly, we open the "Enable Record Unknown Detection" attribute under the "WindowsDefender" sub-item. Set the window and select the "Enabled" item in the subsequent interface, so that Vista The firewall also automatically detects unknown files and records the results. In the future, we can look at the relevant log records to find the various security threats hidden in the local computer system.

Copyright © Windows knowledge All Rights Reserved