1 00:00:02,770 --> 00:00:05,050 Windows Defender Firewall is accessible. 2 00:00:05,350 --> 00:00:11,710 We, uh, control panel here and system and security control panel. 3 00:00:12,170 --> 00:00:13,300 Uh, here you can. 4 00:00:13,420 --> 00:00:22,030 You will find system and security system and security and then select Windows Defender Firewall here. 5 00:00:23,930 --> 00:00:28,430 As you can see here, and it works at home, you know, most people on the network. 6 00:00:29,300 --> 00:00:36,920 So we can see how many five of us have been configured in this crucial private networks trust or public 7 00:00:36,920 --> 00:00:38,150 networks firewalls. 8 00:00:39,050 --> 00:00:47,690 As you can see, so notice that it details the configuration, the four private network and public networks. 9 00:00:47,690 --> 00:00:54,290 When you connect to any new network, you are prompted to specify that sort of network location you 10 00:00:54,290 --> 00:00:55,160 are connecting to. 11 00:00:55,640 --> 00:01:04,190 Her home or work networks are classed as private networks, WiFi hotspots in bars, libraries, coffee 12 00:01:04,190 --> 00:01:05,480 shops and so on. 13 00:01:05,690 --> 00:01:11,180 Well, the cost classed as coerced or public networks. 14 00:01:11,630 --> 00:01:18,350 When you select one of these options, a set of preconfigured firewall rules are applied to that connection. 15 00:01:18,770 --> 00:01:25,430 So a connection type that is not displayed in the in this screenshot is the the domain here. 16 00:01:28,620 --> 00:01:28,950 Here. 17 00:01:30,040 --> 00:01:30,640 Storm. 18 00:01:35,660 --> 00:01:39,230 Notice that these are really the only settings to change them. 19 00:01:39,600 --> 00:01:49,610 Uh, you need to turn Windows Defender five or turn off Windows Defender firewall, so uh, to enter 20 00:01:49,610 --> 00:01:55,820 this area, you have to you just have to click turn Windows Defender five on the roof and you can control 21 00:01:56,420 --> 00:01:58,010 the Windows Defender firewall here. 22 00:01:58,760 --> 00:02:02,270 Uh, so as you can see if the pirate is turned on. 23 00:02:02,730 --> 00:02:04,600 Uh, we have two future options. 24 00:02:04,610 --> 00:02:09,860 Uh, we can configure, uh, block all incoming, uh, here. 25 00:02:09,860 --> 00:02:16,850 Block all incoming connections, including using the list of all of DApps, and then notify me when 26 00:02:16,850 --> 00:02:19,310 Windows Defender blocks a new application. 27 00:02:19,730 --> 00:02:25,040 And this is the private network settings and also we have public network in separately. 28 00:02:25,310 --> 00:02:28,610 You can see here we have turned on by default. 29 00:02:28,610 --> 00:02:31,520 It's I, uh, I hadn't changed this yet. 30 00:02:31,850 --> 00:02:36,860 So as you can see, notify me when Windows Defender Firewall blocks a new application. 31 00:02:37,490 --> 00:02:43,130 So as soon as you can see if the firewall is turned on, we have two future options. 32 00:02:43,130 --> 00:02:49,910 We can configure block incoming connections, including those in the list of allowed apps and notify 33 00:02:49,910 --> 00:02:54,140 me when Windows Defender UM Firewall blocks a new application. 34 00:02:54,470 --> 00:03:01,790 So the latter option is useful if you don't know what applications there are trying to use your network 35 00:03:01,790 --> 00:03:06,410 connection, since you can allow or deny one case by case basis. 36 00:03:07,420 --> 00:03:14,980 To them here, we can go into the advanced settings here and, um, Windows Defender firewall, as you 37 00:03:14,980 --> 00:03:16,990 can see, click here Advanced Settings. 38 00:03:17,390 --> 00:03:19,540 And let me check, can you see my screen? 39 00:03:20,200 --> 00:03:20,530 Yes. 40 00:03:20,920 --> 00:03:22,240 So, uh, when? 41 00:03:23,780 --> 00:03:28,130 So after clicking advanced settings, you will see a screen like that. 42 00:03:29,200 --> 00:03:32,080 So, uh, this screen here. 43 00:03:32,350 --> 00:03:32,980 Um. 44 00:03:36,590 --> 00:03:42,270 Is the Windows, uh, defender stone settings, so the initial screening provides you with an overview 45 00:03:42,270 --> 00:03:50,310 of the firewall and on the, uh, right hand side here, a close, um, right hand side allows you to 46 00:03:50,310 --> 00:03:53,040 import and export firewall policies. 47 00:03:53,790 --> 00:03:56,940 Clicking in England, uh, rules here. 48 00:03:57,390 --> 00:04:04,410 Um, in one rule, it takes you, uh, to a list of current inbound rules, as shown here. 49 00:04:05,380 --> 00:04:14,680 So actually, like what's clicking on the art rules it out controls here provides you. 50 00:04:14,920 --> 00:04:15,490 Uh, yeah. 51 00:04:27,050 --> 00:04:32,270 Provides you a list of current occupant rules here, as you can see here. 52 00:04:33,080 --> 00:04:41,450 So actually, by double clicking on existing rules, you can see the properties of these rules here. 53 00:04:41,450 --> 00:04:45,130 For example, they have so many outpatient rules and important rules here. 54 00:04:45,260 --> 00:04:49,160 Let's here, as you can see, we have our rules, Skype here. 55 00:04:50,270 --> 00:04:52,970 So, um, you know, actually. 56 00:04:54,540 --> 00:04:59,010 We have Windows shell experience here as well. 57 00:05:00,110 --> 00:05:04,240 Windows, shell experience, windows, shell experience. 58 00:05:05,530 --> 00:05:06,730 Whereas you can see it. 59 00:05:07,930 --> 00:05:11,980 We can open double of these connections here. 60 00:05:19,680 --> 00:05:20,040 Here. 61 00:05:22,300 --> 00:05:28,570 So as you can see, this info here is a predefined rule, and some of its properties can be modified. 62 00:05:29,350 --> 00:05:30,700 So, um. 63 00:05:33,150 --> 00:05:41,610 So you can see if we can change some rules, and we can also add a new rules, which is the program 64 00:05:41,610 --> 00:05:48,600 here, so a new rule can be created by selecting the appropriate, appropriate direction here. 65 00:05:50,790 --> 00:05:59,230 As you can see here, that is inbound or adamant and clicking on new rule here, as you can see in policy. 66 00:05:59,660 --> 00:06:02,800 New rule and enables rule we have here. 67 00:06:03,060 --> 00:06:08,720 And as you can see, we have filter, we can filter by profile, picture by state, lifted by group. 68 00:06:08,730 --> 00:06:14,880 And also, as you can see here, we can select a creature new rule here. 69 00:06:15,210 --> 00:06:20,190 So I will create art, but through just select the ultimate rule and then click the new rule here. 70 00:06:20,940 --> 00:06:27,900 So as you can see here and you will see a screenshot, actually, we you will see that window like that, 71 00:06:27,900 --> 00:06:28,530 like that. 72 00:06:28,890 --> 00:06:34,610 Not that we can create program port predefined and custom custom rules. 73 00:06:34,610 --> 00:06:35,040 See it. 74 00:06:36,180 --> 00:06:39,750 So as you can see, look at these steps in left hand here. 75 00:06:40,050 --> 00:06:44,430 So the program and port options have five. 76 00:06:44,430 --> 00:06:49,560 Spin is five, uh, steps here, as you can see here. 77 00:06:50,550 --> 00:06:59,270 Um, but, uh, predefined uh, only has two uh, steps as shown here here. 78 00:06:59,460 --> 00:07:03,170 And actually, we cannot increase the size of with. 79 00:07:03,570 --> 00:07:09,360 So going through the each of the rules types and configuring each will, uh, drastically increase the 80 00:07:09,360 --> 00:07:11,060 length of this course. 81 00:07:11,070 --> 00:07:19,110 However, I would like to just highlight, uh, one of the steps of the costume, namely protocols here, 82 00:07:19,110 --> 00:07:22,800 as you can see here for the program custom here. 83 00:07:23,770 --> 00:07:24,310 So. 84 00:07:29,270 --> 00:07:34,170 So you can see after clicking on and we can click on next next. 85 00:07:34,250 --> 00:07:36,110 As you can see here, we have protocol. 86 00:07:36,260 --> 00:07:38,690 We have to specify protocol type. 87 00:07:38,960 --> 00:07:47,690 As you can see, we have hopefully I see ICMP for TCP, UDP, IPv6 and like that I will select the TCP 88 00:07:47,690 --> 00:07:48,050 here. 89 00:07:48,320 --> 00:07:51,200 And as you can see, import number is default political. 90 00:07:51,200 --> 00:07:52,670 No, actually put no. 91 00:07:52,670 --> 00:07:58,730 As a as you can see here, every protocol has numbers assigned to it. 92 00:07:58,820 --> 00:08:04,490 So I will select here so we can also sign local port here. 93 00:08:04,490 --> 00:08:12,020 Local ports, for example, in my case, specific port, for example, five five five five five five 94 00:08:12,350 --> 00:08:14,210 and the remote port, for example. 95 00:08:14,540 --> 00:08:15,110 Um. 96 00:08:16,140 --> 00:08:25,650 So if the specific port thinks 666, so as you can see it defined, some ports here aren't some political 97 00:08:25,740 --> 00:08:27,660 and after clicking clicking next. 98 00:08:28,050 --> 00:08:34,560 And as you can see here, we have IP addresses to a sign like that. 99 00:08:35,040 --> 00:08:42,630 So next, unless you can see here, we just ask something what action should be taken when a conviction 100 00:08:42,630 --> 00:08:45,150 measured matches the specific conviction? 101 00:08:45,320 --> 00:08:48,720 Look, the connection, for example, and we went there. 102 00:08:48,840 --> 00:08:52,140 When does this rule apply a public private domain? 103 00:08:52,740 --> 00:09:01,680 Apply all of this and name my useless, uh, role here, for example, because this rule has not, uh, 104 00:09:02,280 --> 00:09:04,530 is not usable and we will not use it. 105 00:09:04,780 --> 00:09:09,390 This is just an example to have to create and new rule.