Windows Firewall with Advanced Security (Guide for Vista)

Discussion in 'other firewalls' started by Stem, Apr 19, 2009.

Thread Status:
Not open for further replies.
  1. m00nbl00d

    m00nbl00d Registered Member

    Yes, beta version.

    These are the rules I've created:

    NisSrv.exe - Protocol: Any (I still don't know how exactly the network scanning works, so I allow to scan all protocols); Remote port: Any; Remote IPs: Any

    msseces.exe: Protocol: TCP; Remote port: 80, 443; Remote IPs: Any

    MsMpEng.exe: Protocol: TCP; Remote port: 80, 443; Remote IPs: Any

    MpCmdRun.exe: Protocol: TCP; Remote port: 80, 443; Remote IPs: Any

    MpSigStub.exe: Protocol: TCP; Remote port: 80, 443; Remote IPs: Any
     
  2. Greg S

    Greg S Registered Member

    Did your Beta update today?
     
  3. m00nbl00d

    m00nbl00d Registered Member

    Yes, it did. Not sure if a final version, if that's what you mean't?
     
  4. m00nbl00d

    m00nbl00d Registered Member

    You might actually just need to add the full network to Windows Update so that MSE can update, because it will fail depending if it's still looking up the two IPs I previously mentioned or new ones.

    Network: 92.122.208.0/22

    http://www.dshield.org/ipinfo.html?ip=92.122.208.34
     
  5. m00nbl00d

    m00nbl00d Registered Member

    OK. I simply cannot make the command to audit events to work. I always get an error message 0x00000057 parameter incorrect.

    Searching for this error, specifically in this case, resulted in nothing that I could I find.

    Any thoughts o_O
     
  6. Greg S

    Greg S Registered Member

    Hmm, not offhand. Have you tweaked any services to disabled? <--- don't think that would really matter since I have way more than normal disabled myself. Here's what I am using from Admin cmd.

    Code:
    auditpol /set /subcategory:"Filtering Platform Connection" /success:disable /failure:enable
    
    net stop MPSSVC
    
    net start MPSSVC
     
  7. m00nbl00d

    m00nbl00d Registered Member

    I have quite a few disabled, yes. SSDP Discovery, UPnP, DNS Client, and a few others like Media Center stuff, Windows Media Player Network Share (or something like that).

    Even writing just auditpol /set results in the error message. So, the problem lies with auditpol itself. Odd.
     
  8. Greg S

    Greg S Registered Member

    Yea, I have all them disabled as well, and then some,lol.
     
  9. m00nbl00d

    m00nbl00d Registered Member

    I got it to work, but I had to enter each command separately and use my own language to substitute parts like "Filtering Platform Connection".
     
  10. Greg S

    Greg S Registered Member

    Yes, I started to state that each line in the code box is a different command. Sorry.

    Have you made your custom popup dialog alert yet,lol

    Untitled.png
     
  11. m00nbl00d

    m00nbl00d Registered Member

    Yeah, but far from being great. One still has to check the Event Viewer, though. lol
     
  12. Greg S

    Greg S Registered Member

    Exactly! We need some way of getting the Event information into an alert.
     
  13. m00nbl00d

    m00nbl00d Registered Member

    I think it could be possible to create a PowerShell script to do that, for example. It's possible to run one to read the firewall log, but no good here, because it still lacks the processes names, so it would be possible to get info from Event Viewer. I just don't know much about Powershell scripting.
     
  14. wat0114

    wat0114 Guest

    I guess it would be nice to have pop-up alerts for blocks, but once you have the rules in place for all necessary programs, then, really, how important is it to know what's being blocked? If one can accept Winfw for the type it is - a default deny fw (oops, where have we see that term before :D :p ), then most every block occuring henceforth will only be that of Internet "noise" or other inbound/outbound traffic types not necessarily needed like discovery and upnp, tcpv6...for example. IOW, probably not that important to know about anyway. If something isn't communicating that should be, the logs are at least there to check, even though their a bit cumbersome to access.
     
  15. Greg S

    Greg S Registered Member

    This article describes how to do it with some of the things already mentioned. Looks like #^^&*)(! to me. Anyone here knowledgeable enough to do this?

    http://support.microsoft.com/?scid=kb;EN;815314
     
  16. Rilla927

    Rilla927 Registered Member

    Is there anyone in this thread using Avast Pro? If so, can you tell me how you have the rules setup.

    I just installed it yesterday and it could not update and right after that I lost me whole network. I'm wondering if my rules become corrupt. I'm using a Live CD right now.
     
    Last edited: Nov 15, 2010
  17. m00nbl00d

    m00nbl00d Registered Member

    OK. Not avast! Pro, but I've been testing avast! free in a virtual machine and these are the rules I've created for it, so that it could update.
    Since I have DNS Client disabled, I needed two rules for that update process:

    Process name: AVAST.SETUP
    Protocol: TCP
    Remote Port: 80
    Remote Address: Any

    The other rule if for DNS.

    Even if you do not see the process AVAST.SETUP, create the rule as if the process is there.

    Later on, I'll check the other rules. I can't start the virtual machine right now, sorry.

    Most likely, you've lost network connection, perhaps due to the Network Shield not having an Internet connection o_O


    Regards
     
  18. Rilla927

    Rilla927 Registered Member

    Okay, I found out the web shield is blocking the net. I can't find anything in the program folders that refers to web shield.

    I will try your rule, thanks.

    How did you make the rule if you don't have the .exe to point too?
     
  19. m00nbl00d

    m00nbl00d Registered Member

    Again, I don't remember the exact path, but I believe it is C:\Program Files\Alwil Software\Avast5\Setup\avast.setup

    When creating the rule just write %ProgramFiles%\Alwil Software\Avast5\Setup\avast.setup

    By the way, I don't remember if it's Alwil Software or Avast Software, because they changed from Alwil to Avast; so I don't recall whether or not the path reflects that change as well.

    But, since you have it, you can simply see which one is, I guess. :)
     
  20. Rilla927

    Rilla927 Registered Member

    Okay, I will try that.

    I found this published by Avast.

    Allow ashWebSv.exe or aswWebSv.exe (web shield) access to TCP port 80 and permission to act as a server and accept incoming connections from local host on TCP port 12080.

    I looked in avast program files\setup and there is no .exe at all in there.
     
  21. m00nbl00d

    m00nbl00d Registered Member

    I believe -not 100% sure - that that file is created when first needed, that is when the first update happens. I've seen it once - lucky fellow here. lol

    But, go ahead and create the rule for avast.setup (no *.exe extension, just avast.setup). You need it so that avast! updates.

    -Edit-

    You mean there's no ashWebSv.exe or aswWebSv.exe in Setup dir? Maybe it's in one of the other dirs. I'll install avast! again in the virtual machine and see what I get.
     
  22. Kerodo

    Kerodo Registered Member

    Avast.Setup is created on the fly every time Avast updates, then it's deleted/removed when the update is done.
     
  23. m00nbl00d

    m00nbl00d Registered Member

    Thanks! I wasn't entirely sure. I've seen it happening once, as I mentioned, but never again.


    Regards
     
  24. m00nbl00d

    m00nbl00d Registered Member

    The other rules are as follows:

    Process name: AvastSvc.exe
    Protocol: TCP
    Remote Address: Any

    Inbound rule for AvastSvc.exe:

    Protocol: TCP
    Local Address: 127.0.0.0/8 and 0.0.0.0

    Process name: AvastUI.exe
    Protocol: TCP
    Remote Address: Any

    These were the rules I had created back then. I haven't played with them much, though. But, for what I could see it was working fine, and Network Shield was blocking malicious websites, so... I guess those rules are, at least, what is required.
     
  25. Poni

    Poni Registered Member

    I got wierd problem with Windows 7 64bit Advanced Firewall. Iv allowed Chrome to access port 443 etc but it still blocks it..i cant access secure web sites ,only normal web sites.
    I noticed something wierd..when i install SRWare Iron "Chrome alternative" to programs folder it can access all sites..but when i install SRWare iron portable to user folder like Chrome forces you to install, it doesent allow to connect secure sites.
    Same goes to Opera with user folder secure sites no work but with normal programs folder all work.
    Tried mIRC too and it doesent connect port 6667 etc when in user folder and when in the programs folder it works perfectly.
    When i allow Firewall to connect all outbounds it does work.

    The Windows Filtering Platform has blocked a connection.

    Application Information:
    Process ID: 1108
    Application Name: \device\harddiskvolume2\users\tomi\appdata\local\google\chrome\application\chrome.exe

    Network Information:
    Direction: Outbound
    Source Address: 192.168.11.2
    Source Port: 51174
    Destination Address: 62.13.0.79
    Destination Port: 443
    Protocol: 6

    Filter Information:
    Filter Run-Time ID: 89550
    Layer Name: Connect
    Layer Run-Time ID: 48
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice