Creating a Custom Group Policy to Add a Firewall Rule

The Windows firewall blocks unsolicited incoming traffic, and this behavior means that individual programs do not have to be defined in the firewall exceptions list in order for those programs to function behind the Windows firewall. The Windows STIGs includes some firewall rules for Core Networking components, but additional rules may occasionally be required at a local site. Firewall rules that are defined in separate group policy objects are cumulative.

The purpose of this documentation is to explain the process of creating a firewall customization group policy object.

Timeouts have been seen while editing the firewall GPOs. Keep the GPO editor open when doing firewall GPOs as they take time to sync to AGPM. If you receive the error message: There is no such object on the server, close the GPO and reopen it.

 
This steps below assume that a Group Policy Object has been named, checked out, and is open for editing. In this example, the GPO TacomaWA-W Firewall Customization – Ultrabac is being edited. The rule will allow inbound connections for TCP 1910.

Consider using an apropriate filter, such as the Windows 10 WMI filter, to ensure the Firewall Customization will only apply to appropriate Windows systems. This can be done by requesting a new GPO with the WMI filter in place, or by requesting that the WMI filter is added when the GPO is deployed. For more information on AGPM, see: http://tst.usgs.gov/applications/security/advanced-group-policy-management/


Expand Computer Configuration\Policies\Windows Settings\Security Settings\Windows Defender Firewall with Advanced Security. Expand the next node that begins with Windows Defender Firewall with Advanced Security.., right-click on Inbound Rules, and click New Rule… to start the New Inbound Rule Wizard

Inbound Rule Wizard - Rule Type Selection
Select the type of Rule. In this example, Port is selected. Click Next.

Inbound Rule Wizard - Protocol and Ports Selection
Define the Protocol and Ports for the rule. In this example, TCP is chosen and the port 1910 is specified. Click Next.

Inbound Rule Wizard - Action Selection
Define the action to be taken with this rule. In this example, Allow the connection is selected. Click Next.

Inbound Rule Wizard - Profile Selection
Check all of the profiles to which the firewall rule will apply. In this example, Ultrabac traffic will only be allowed when the system is on connected to the GS Domain and the Domain firewall profile is in use. Click Next.

Inbound Rule Wizard - Name Selection
Give the rule a name and a desciption. Click Finish.

Group Policy Edit - Inbound Rules List
The Rule is now listed in the right-hand pane. To make additional, or more granular adjustments, double click on the Rule.

Firewall Rule - Computers Tab
The firewall rule can be further defined for specific programs, computers, or users. In this example, no additional configuration was made.

Follow the standard procedures for checking in and deploying the Group Policy Object. In the Group Policy Management Console, navigate to the appropriate OU, right click, and choose Link and Existing GPO.

Select the GPO to be linked in Group Policy Management
In the select GPO window, scroll down to the GPO, highlight, and click OK. In this example, the TacomaWA-W Firewall Customization – Ultrabac GPO is selected.

Comments are closed.