4.4 Implementing Host-based Firewall Functionality Using Windows Firewall
4.4 Implementing Host-based Firewall Functionality Using Windows Firewall
2 Hr 12 Min Remaining
Instructions Resources Help 100%
Exercise 4: Implementing Host-based Firewall Functionality
Using Windows Firewall
A host-based firewall protects the system from various threats. Configuring a host-based firewall will
help achieve the real security implementation and Defense in Depth within an organization. The
normal strategy of a host-based firewall is to provide defense-in-depth and use a combination of layers
of protection within the organization.
Lab Scenario
Network defenders implemented various security layers in the organization; a single breach in
security can allow the attacker to leave malicious code or transfer the malicious file over the network.
Host-based firewall implementation is another security layer where the admin can allow or restrict
specific individual endpoints. In this lab, you will configure a host-based firewall to protect the
individual system connected to the network. Lab Objectives
This lab will demonstrate how to secure an individual endpoint within the network. In this lab, you
will learn how to do the following:
A host-based firewall is a software that makes the system or device secure. An example is the
Windows firewall, which is inbuilt in the Windows platform. The Windows firewall developed by
Microsoft Windows is an application that filters the incoming and outgoing Internet traffic and
blocks the malicious program communicating to the individual endpoint. The Windows firewall
(host-based) protects the individual endpoint over the network from various threats, viruses, and
malware.
Lab Tasks
If you have already launched Smoothwall Firewall, AD Domain Controller, and Admin Machine-1 VMs
in the previous exercise, skip steps from 1 to 12.