About 334 results
Open links in new tab
  1. Firewall and Network Protection in the Windows Security App

    Learn how to turn the Windows Firewall on or off using the Windows Security app.

  2. Risks of Allowing Apps Through Windows Firewall

    Learn about the risks of allowing apps through Windows Firewall, and how to add or remove apps from the list of allowed apps.

  3. Firewall and Network Protection in the Windows Security App

    Learn how to turn the Windows Firewall on or off using the Windows Security app.

  4. Preventing SMB traffic from lateral connections and entering or …

    Discusses firewall best practices and standard default firewall configurations that can help protect networks from attacks that originate outside a corporate environment.

  5. Link to or import data from an Azure SQL Server Database

    Before connecting to a Microsoft Azure SQL Database server, the database administrator needs to create server-level firewall rules. These rules specify the public Internet Protocol (IP) …

  6. Remote WMI relies on Windows Firewall settings incorrectly even …

    Describes an issue in which Remote WMI requires Windows Firewall settings even if a third-party firewall is enabled.

  7. You can't connect to Skype for Business Online, or certain features …

    Describes an issue in which you can't connect to Skype for Business Online or certain features don't work because the connection is blocked by an on-premises firewall.

  8. “0x8007042c” error message when you try to start Windows Firewall

    Provides a solution to error message "Windows firewall cannot change some of your settings Error code 0x8007042c" when you try to turn on Windows Firewall after you upgrade to …

  9. A client may not be able to connect to multicast streams or to …

    When a client tries to connect to a stream or to a multicast stream by using UDP protocol, the Windows Media Format SDK and Windows Media Player try to open the ports in Windows …

  10. How to configure RPC to use certain ports and how to help secure …

    Use an IPsec or firewall policy to block access to the vulnerable ports on the affected host In the commands in the following section, any text that appears between percent (%) signs is …