Create a Windows Firewall Policy

The Windows Firewall Policy lets you configure the built-in firewall across various network profiles to enhance network security and manage inbound and outbound traffic on Windows devices. This policy balances security and functionality by providing granular control over firewall behavior in both domain and standard network environments.

Note:

This policy works on all JumpCloud supported operating systems. However, individual settings may not be applicable to all versions of Windows.

To configure a Windows Firewall policy:

  1. Log in to the JumpCloud Admin Portal.
  2. Go to DEVICES > Policy Management.
  3. In the All tab, click (+).
  4. Select the Windows tab.
  5. Select the Windows Firewall policy, then click configure.
  6. (Optional) In the Policy Name field, enter a new name for the policy or keep the default. Policy names must be unique.
  7. (Optional) In the Policy Notes field, enter details like when you created the policy, where you tested it, and where you deployed it.
  8. Under Settings, select from the following configurations:
    1. Windows Firewall: Allow local port exceptions (domain profile): This setting allows exceptions for local network ports specifically for the domain network profile. It permits certain ports to bypass the firewall rules for inbound or outbound traffic within a domain network.
    2. Windows Firewall: Allow local port exceptions (standard profile): Similar to the previous setting, but applies to the standard network profile. It allows exceptions for local network ports in non-domain network environments.
    3. Windows Firewall: Allow local program exceptions (standard profile): This setting allows exceptions for specific programs to communicate through the firewall in non-domain network environments.
    4. Windows Firewall: Allow local program exceptions (domain profile): Similar to the previous setting, but applies to domain network environments. It allows specific programs to bypass the firewall rules for communication within a domain network.
    5. Windows Firewall: Do not allow exceptions (standard profile): This setting prohibits any exceptions for ports or programs in non-domain network environments. It ensures that all traffic must adhere strictly to the firewall rules.
    6. Windows Firewall: Do not allow exceptions (domain profile):
    7. Similar to the previous setting, but applies to domain network environments. It prohibits any exceptions for ports or programs within a domain network.
    8. Windows Firewall: Prohibit notifications (standard profile): This setting disables notifications related to Windows Firewall activities in non-domain network environments.
    9. Windows Firewall: Prohibit notifications (domain profile): Similar to the previous setting, but applies to domain network environments. It disables notifications related to Windows Firewall activities within a domain network.
    10. Windows Firewall: Prohibit unicast response to multicast or broadcast requests (domain profile): This setting prevents the system from responding to unicast requests that are initiated through multicast or broadcast in domain network environments.
    11. Windows Firewall: Prohibit unicast response to multicast or broadcast requests (standard profile): Similar to the previous setting, but applies to non-domain network environments. It prevents the system from responding to unicast requests initiated through multicast or broadcast.
    12. Windows Firewall: Protect all network connections (domain profile): This setting enhances network security by protecting all network connections within a domain network environment.
    13. Windows Firewall: Protect all network connections (standard profile): Similar to the previous setting, but applies to non-domain network environments. It enhances network security by protecting all network connections in such environments.
  9. (Optional) To apply this policy to device groups, select the Device Groups tab. Select one or more device groups that will use this policy. For device groups with multiple OS member types, the policy is applied only to the supported OS.
  10. (Optional) To apply this policy directly to devices, select the Devices tab. Select one or more devices that will use this policy.

Tip:

For this policy to take effect, you must specify a device or a device group.

  1. Click save.
  2. Restart all devices where you applied this policy for it to take effect.
Back to Top

Still Have Questions?

If you cannot find an answer to your question in our FAQ, you can always contact us.

Submit a Case