In my other blog post, We discussed in detail about Creating custom Windows Defender firewall rules using Intune. This post is about Managing Windows Defender firewall using Intune.
To protect organization devices, we want to ensure that the defender firewall is switched on and cannot be turned off by users. Therefore, we will create a Windows defender firewall profile and assign it to Windows devices. Let’s take a look.
Contents
Ways to manage Windows Defender Firewall
You have different ways of managing Windows Defender Firewall. Please find below:
- Using Intune admin center > Endpoint Security > Firewall.
- By creating a Device configuration profile.
- By creating Microsoft Defender for Endpoint Baseline under Endpoint Security.
Devices with Windows Defender Firewall Switched Off
You can find all devices where the Windows Defender firewall is switched off from Intune admin center > Endpoint Security > Firewall. Click on MDM devices running Windows 10 or later with firewall off.
Create a Windows Defender Firewall Policy
To create a Windows Defender firewall policy, follow the below steps:
- Sign in to the Intune admin center > Endpoint Security > Firewall.
- Click on + Create Policy to create a new Firewall Policy.
- Platform: Windows
- Profile: Windows Firewall.
- Click on Create to create this policy.
- Basics: Provide a Name and Description of the Policy.
- Configuration Settings: You can configure the Global settings for the firewall, which are at the top of the list. Then, configure the Domain, Private, and Public profiles as per your requirement. For example, below are the most basic firewall settings I have configured.
- Domain Profile Settings
- Enable Domain Network Firewall: True
- Default Inbound Action for Domain Profile: Block
- Default Outbound Action: Allow
- Private Profile Settings
- Enable Private Network Firewall: True
- Default Inbound Action for Domain Profile: Block
- Default Outbound Action: Allow
- Public Profile Settings
- Enable Public Network Firewall: True
- Default Inbound Action for Domain Profile: Block
- Default Outbound Action: Allow
- Auditing Settings
- Object Access Audit Filtering Platform Connection: Success + Failure
- Object Access Audit Filtering Platform Packet Drop: Success + Failure
- Scope tags: Click Next.
- Assignments tab: Click Add groups and select the Entra security group containing Windows 10/11 devices.
- Review + create: Review the policy and click on Create.
End User Experience
Let’s check and confirm policy deployment on one of the target devices.
- Go to Start > Search for Windows Security App.
- Click on Firewall & network protection on the left-hand side.
- You can find the status of Domain, Private, and Public firewall.
- You can click on the link for each profile to get more information. For example, click Private network and check for more information about the private network profile.
- As you can see in the screenshot below, the Private network Firewall profile is switched on and managed by Intune.
Verify Windows Defender Firewall using Advanced Settings
To verify Windows Defender Firewall status using its advanced settings, follow the below steps:
- Press Windows + R to open the Run dialog box.
- Type
wf.msc
and press Enter. - Click on Windows Defender Firewall Properties.
- A pop-up will open where you can check the configuration of each Firewall Profile.
Manage Windows Defender Firewall using OMA-URI
You can also manage Windows Defender Firewall using OMA-URI settings. To learn more about Firewall CSP Settings, click on the link Firewall CSP. If you want to create a specific custom Windows Defender Firewall rule, refer to the post Create Windows Defender firewall rules using Intune.