Why does Windows Firewall allow inbound connections by default for all - Microsoft Community
to continue initial question posted here, understand why windows firewall allows default incoming connections modern app.
a few observations:
in windows firewall advanced security there 2 sets of rules: inbound , outbound.
outbound rules allow programs , apps communicate internet. inbound rules allow unsolicited connections (as have understood far, random not user or app provoked connections) computer internet.
since windows firewall's outbound scanning disabled default, outbound rules useless due "allow everything" policy (unless there explicit outbound block rule).
regular apps (non servers), such browsers, can work fine having outbound allow rules (or default "allow everything" firewall setting). can still receive incoming data if allowed communicate internet (outbound) if there no allowing inbound rule or if there blocking inbound rule!
for example, launching google chrome , typing address, make browser send request (outbound) website's server , receive info (to display webpage) -- no inbound rule enabled.
i understand unsolicited inbound connections required when, example, sharing files or printers on pc network. remote pc on same network can send request access on resources (media file, printer etc.).
based on above, not see purpose of having inbound allowing rules apps installed on pc. apps can work outbound allowing rules or policy. few apps need receive unsolicited inbound connections work (server apps). why allow apps so? isn't kind of risk, if say, malicious inbound connection exploits vulnerability?
thanks in advance,
john
i not technical person think may have port numbers allow , deny. say, blocked chrome having inbound connection, haven't blocked standard port number 80, http, chrome still have access in searching net. again, not technical person, opinion.
cheers!
Windows / Windows 10 / Security & privacy / PC
Comments
Post a Comment