Question: follow the instructions below. You will create a document containing 6 0 0 + words and include screenshots. 1 . Provide an introduction to Windows

follow the instructions below. You will create a document containing 600+ words and include
screenshots.
1. Provide an introduction to Windows Firewall and PowerShell. In your introduction, explain what
a firewall is and why it's essential for network security. Also, discuss the benefits of managing
the firewall using PowerShell versus the graphical user interface (GUI).
2. Basic Commands:
To add a rule to block an IP address:
New-NetFirewallRule -DisplayName "Block IP"-Direction Inbound -
Action Block -RemoteAddress 192.168.1.100
Writing: Describe what each part of the command does.
To add a rule to block a port:
New-NetFirewallRule -DisplayName "Block Port" -Direction Inbound
-Action Block -Protocol TCP -LocalPort 8080
Writing: Explain the significance of blocking specific ports.
To block all incoming traffic:
Page 2 of 3
New-NetFirewallRule -DisplayName "Block All Incoming" -Direction
Inbound -Action Block
Writing: Highlight when and why you might use this command.
To delete a rule:
Remove-NetFirewallRule -DisplayName "Block IP"
Writing: Discuss the importance of managing firewall rules and removing obsolete ones.
In addition, write a reflection on the importance of firewall management and how these
commands help secure a network.
3. Tasks to complete (screenshots are needed for each task):
Task 1: Add a rule to block all incoming traffic from an IP address of your choice. To find out
the IP address of a website, in PowerShell, type the following:
nslookup websitename.com
Task 2: Add a rule to block all incoming TCP traffic on port 8080.
Task 3: Add a rule to block all outgoing traffic.
Task 4: Open the browser and try going to that website. The website should be inaccessible.
Task 5: Delete the rule that blocks the IP address you blocked in task 1. Complete this task
last after completing part 4 below.
4. To verify that the firewall rules have been applied correctly in PowerShell, do the following
(screenshots are needed for each task below):
List Existing Rules: Use this command to display a list of all firewall rules:
Get-NetFirewallRule
Check Specific Rules: Filter the list to check specific rules by name:
Get-NetFirewallRule -DisplayName "Block IP"
Check Active Firewall Rules: Ensure your new rules are active and applied:
Get-NetFirewallRule | Where-Object { $_.Enabled -eq 'True' }
Check Traffic: You can use Windows Defender Firewall with Advanced Security to
monitor and manage network traffic (or you can use a tool called Wireshark.) Heres how
you can do it using Windows Defender:
- Open Windows Defender Firewall with Advanced Security:
- Press Win + R, type wf.msc, and press Enter.
Page 3 of 3
View Active Firewall Rules: In the left pane, click "Inbound Rules" or "Outbound Rules"
to see the current rules. Look for the rules you added, such as "Block IP" or "Block Port."
Check Rule Status: Double-click on a rule to open its properties. Ensure the rule is
enabled and correctly configured.
Notes: In the Windows Defender Firewall with Advanced Security window, you can monitor
traffic by observing the logs and alerts generated by the firewall. You can also use the
"Monitoring" tab to view the firewall's activity and ensure that the rules are blocking the
intended traffic.
What to include in your document:
Include in the document a discussion of each prompt in numbers 1 and 2 of the instructions. Include
screenshots of the PowerShell window showing each command you executed and its output for
numbers 3 and 4.
Page 3 of 3
View Active Firewall Rules: In the left pane, click "Inbound Rules" or "Outbound Rules"
to see the current rules. Look for the rules you added, such as "Block IP" or "Block Port."
Check Rule Status: Double-click on a rule to open its properties. Ensure the rule is
enabled and correctly configured.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!