

If a third-party firewall is used, configure inbound exceptions to only include authorized remote management hosts. This may be defined as an IP address, subnet or range. If a third-party firewall is used, ensure comparable settings are in place.Ĭonfigure firewall exceptions to inbound connections on domain workstations to include only authorized remote management hosts.Ĭonfigure only inbound connection exceptions for authorized remote management hosts.įor any inbound rules that allow connections, configure the Scope for Remote IP address to those of authorized remote management hosts. Go to Control Panel > Windows Defender Firewall > Allow an app or feature through Windows Defender Firewall and then tick the checkboxes next to. The rule must apply to all firewall profiles. This may be defined as an IP address, subnet, or range. If allowed inbound exceptions are not limited to authorized remote management hosts, this is a finding.Ĭomputer Configuration > Windows Settings > Security Settings > Windows Firewall with Advanced Security > Windows Firewall with Advanced Security > Inbound Rules (this link will be in the right pane)įor any inbound rules that allow connections view the Scope for Remote IP address. Verify firewall exceptions to inbound connections on domain workstations include only authorized remote management hosts. Windows 10 Security Technical Implementation Guide Limiting inbound connections only from authorized remote management systems will help limit this exposure.

Allowing inbound access to domain workstations from other systems may allow lateral movement across systems if credentials are compromised.
