![]() I ended up creating a WMI filter to apply it only to my workstations for now (WMI filter I used was 'select * from Win32_OperatingSystem where Version like "6.%" and ProductType="1"') (see ). It wasn't until I created a domain GPO that it applied, and even then I needed a reboot on some of my testing workstations. ![]() Oddly, setting this in the Local Group Policy Editor seemed to have no effect. The rule was a default rule that could only be overridden by the GPO for "Computer Config/Network/Network Connections/Windows Defender Firewall/Domain Profile/Windows Defender Firewall: Allow inbound remote administration exception" (for details, see ). The rule could not be modified except through the local group policy editor. I missed the rule "Remote administration (NP-In)" that oddly was set to block port 445 only on domain networks, and since a BLOCK overrules my ALLOW port 445 rule, we were getting nowhere.įurther investigation revealed the firewall rule in question was applied by a *Local* Group Policy Setting (I had to add the column "rule source" to the Windows Defender Firewall application under the "inbound rules" branch to be able to see this). It required turning on logging in the Windows Defender Firewall to see. Port 445 was closed on the client workstations. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |