0% found this document useful (0 votes)
43 views21 pages

Nis Microproject

The document outlines a micro project on setting up a firewall using Windows Defender, submitted by a group of students for their Diploma in Computer Engineering. It provides an introduction to firewalls, their types, and the specific features of Windows Defender Firewall, emphasizing its importance in cybersecurity. The project aims to equip students with practical knowledge of firewall configuration and security management, enhancing their technical skills in preventing cyber threats.

Uploaded by

prajyot20naik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views21 pages

Nis Microproject

The document outlines a micro project on setting up a firewall using Windows Defender, submitted by a group of students for their Diploma in Computer Engineering. It provides an introduction to firewalls, their types, and the specific features of Windows Defender Firewall, emphasizing its importance in cybersecurity. The project aims to equip students with practical knowledge of firewall configuration and security management, enhancing their technical skills in preventing cyber threats.

Uploaded by

prajyot20naik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

A

Micro Project
On
“SETTING UP A FIREWALL USING WINDOWS
DEFENDER”
Submitted in partial fulfillment of the requirement for the award of
Diploma of Engineering
In
Computer Engineering
By
SHAIKH MOHAMMAD SALMAN
RAUT AARYA
PATIL SRUSHTI
SAINDANE VINAYAK
GUJAR ANUSHA

under the guidance of

Prof. SHWETA TARAL

Department of Computer Engineering


A.Y. 2024-25
CERTIFICATE

VIVA COLLEGE OF DIPLOMA ENGINEERING &


TECHNOLOGY VIRAR (E)
2024-25
This is to certify that the micro project entitled “SETTING UP A FIREWALL
USING WINDOWS DEFENDER” has been submitted by group under the guidance
of Prof. SHWETA TARAL in partial fulfillment of therequirement for the award of
Diploma of Engineering in Computer Engineering from Maharashtra State Board of
Technical Education.

“SETTING UP A FIREWALL USING WINDOWS


DEFENDER’’

GROUP MEMBERS

91. SHAIKH MOHAMMAD SALMAN


92. RAUT AARYA
93. PATIL SRUSHTI
94. SAINDANE VINAYAK
95. GUJAR ANUSHA

Project Guide H.O. D


Prof. SHWETA TARAL Prof. POONAM JADHAV
INDEX

Sr. No. Name of the topic Page no.

PART –A PLAN

1 Brief Introduction 1

2 Aim of the Micro-Project 3

3 Resources Required 4

PART –B OUTCOMES

1 Brief Description 5

2 Aim of Micro-Project 9

3 Course Outcomes Integrated 10

4 Actual Procedure Followed 11

5 Actual Resources Used 16

6 Outpus of Microproject 17

7 Skill Developed 18
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS 22620, Sem VI

PART-A PLAN

1.0 Brief Introduction

A firewall is a network security system that monitors and controls incoming and outgoing network traffic
based on predefined security rules. It acts as a protective barrier between a trusted internal network and
untrusted external networks, such as the internet. The primary function of a firewall is to block unauthorized
access while allowing legitimate communications to pass through. Firewalls are essential in both personal and
organizational settings to prevent cyber threats, data breaches, and malware attacks. They work by inspecting
data packets, analyzing their source and destination, and determining whether they should be allowed or
denied based on security policies.

Firewalls can be hardware-based or software-based. A hardware firewall is a physical device installed between
a network and an external connection, such as a router. It is commonly used in businesses and large
organizations to provide network-wide protection. A software firewall, on the other hand, is a program
installed on an individual device, such as a computer or server. It monitors and filters network traffic specific
to that device. Both types of firewalls play a crucial role in preventing hackers, malware, and unauthorized
users from accessing sensitive information.

Features of a Firewall
A firewall provides several essential features to enhance network security. One of the most important features
is packet filtering, which allows or blocks data packets based on security rules. Firewalls can also perform
stateful inspection, where they track active connections and determine whether new packets belong to an
existing session. Another key feature is access control, which allows administrators to define which
applications, websites, or IP addresses can access a network. Firewalls also help in intrusion prevention,
blocking suspicious activities before they can compromise the system. Additionally, firewalls provide logging
and monitoring, which helps network administrators track traffic patterns and detect security breaches.

Firewalls use different techniques to enforce security, such as proxy filtering, where the firewall acts as an
intermediary between a device and the internet, and deep packet inspection (DPI), which examines the content
of data packets to detect malicious activity. With the growing number of cyber threats, modern firewalls,
known as Next-Generation Firewalls (NGFWs), include advanced security features like AI-driven threat
detection, malware scanning, and VPN support. These features ensure that firewalls not only block
unauthorized access but also protect against sophisticated cyber threats.

Windows Defender Firewall


Windows Defender Firewall is a built-in security feature in Windows operating systems designed to protect
computers from unauthorized access and cyber threats. It provides real-time monitoring and filtering of
network traffic to prevent malware infections, hacking attempts, and unauthorized network access. Windows
Defender Firewall is an example of a software firewall that operates at the individual device level, ensuring
that each computer has a layer of protection.

One of the key advantages of Windows Defender Firewall is its user-friendly interface, allowing users to easily
VIVA COLLEGE OF DIPLOMA ENGG & 1
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS 22620, Sem VI
create and manage inbound and outbound rules. These rules define which applications and services can access
the internet or communicate with other networks. Users can also block or allow specific IP addresses,
protocols, and ports, enhancing network security. Additionally, Windows Defender Firewall includes
Advanced Security settings, where IT administrators can configure policies for domain networks, private
networks, and public networks.

Windows Defender Firewall is an essential security tool for both home users and businesses. It helps prevent
unauthorized remote access, stops malware from spreading through the network, and enhances overall system
security. By enabling firewall logging and alerts, users can track suspicious activities and take immediate
action to mitigate risks. Combined with Windows Security features, such as antivirus protection and Windows
Defender SmartScreen, the firewall provides comprehensive security for Windows users.

In conclusion, a firewall is a crucial component of cybersecurity that protects systems from unauthorized
access and malicious attacks. Its ability to monitor, filter, and control network traffic ensures that users and
organizations remain safe from cyber threats. Windows Defender Firewall, as a built-in security solution,
provides an effective and user-friendly approach to firewall management, making it an essential tool for
securing Windows computers. As cyber threats continue to evolve, firewalls will remain a fundamental
defense mechanism in ensuring network security and protecting sensitive data.

VIVA COLLEGE OF DIPLOMA ENGG & 2


TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS 22620, Sem VI

2.0 AIM of Micro-Project

The aim of this project is to equip students with practical knowledge of firewall configuration and security
management using Windows Defender Firewall. It provides hands-on experience in network protection, traffic
control, and rule-based access management, enhancing both technical and problem-solving skills in
cybersecurity. By the end of the project, students will gain expertise in securing Windows systems and
implementing effective firewall strategies to prevent cyber threats.

VIVA COLLEGE OF DIPLOMA ENGG & 3


TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS 22620, Sem VI

3.0 Resources Required

Sr. Name of Specification Qty Remarks


No Resource

1 Computer HP processor Intel 1


(R) Core (TM) is
9400T
[email protected]
RAM 8 GB
2 Software Windows Defender 1
Firewall

3 Software Windows Control 1


Panel

VIVA COLLEGE OF DIPLOMA ENGG & 4


TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI

PART-B OUTCOME

1.0 Brief Description

What is a Firewall?
A firewall is a network security system that monitors and controls incoming and outgoing network traffic
based on predefined security rules. It acts as a protective barrier between a trusted internal network and
untrusted external networks, such as the internet. The primary function of a firewall is to block unauthorized
access while allowing legitimate communications to pass through. Firewalls are essential in both personal and
organizational settings to prevent cyber threats, data breaches, and malware attacks. They work by inspecting
data packets, analyzing their source and destination, and determining whether they should be allowed or
denied based on security policies.

There are two types of firewalls:


1. Hardware Firewall
2. Software Firewall

1. Hardware Firewall

A hardware firewall is a physical device that is installed between a network and an external connection, such
as the internet. It functions independently from the devices it protects and is typically used by businesses,
enterprises, and data centers to provide network-wide security.

How It Works ?

A hardware firewall is integrated into network equipment, such as routers or dedicated firewall appliances.
It inspects incoming and outgoing data packets, determining whether to allow or block them based on a set of
security rules. Since it operates at the network level, it provides protection to all devices connected to the
network, including computers, servers, and IoT devices.

Key Features of a Hardware Firewall

 Network-Wide Protection: Secures all devices within the network.

 Traffic Filtering: Examines data packets to block unauthorized access.

 Intrusion Prevention System (IPS): Detects and blocks malicious activities.

 Built-in VPN Support: Enables secure remote access.

 Performance Optimization: Reduces network congestion by managing traffic efficiently.

5
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI

Advantages of Hardware Firewalls

1. Stronger Security: Hardware firewalls operate independently from the operating system, making them
less vulnerable to attacks.

2. Protects Multiple Devices: Since it works at the network level, a single firewall can protect an entire
organization.

3. Prevents Unauthorized Access: Blocks threats before they reach internal devices.
Improves Performance: Reduces the load on individual devices by handling security at the network level.

Disadvantages of Hardware Firewalls

1. Expensive: Hardware firewalls require a higher initial investment.

2. Complex Configuration: Requires technical expertise for setup and management.

3. Not Suitable for Individuals: Best suited for organizations rather than personal use.

Examples of Hardware Firewalls

 Cisco ASA (Adaptive Security Appliance)

 Fortinet FortiGate Firewall

 Palo Alto Networks Firewall

 SonicWall Network Security Appliance

Hardware firewalls are ideal for large organizations, data centers, and corporate networks that require
centralized security for multiple devices.

2. Software Firewall
A software firewall is a program installed on an individual computer or server to control network traffic
and prevent unauthorized access. Unlike hardware firewalls, software firewalls operate at the device level,
providing security for a single system rather than an entire network.

How It Works?
A software firewall monitors and filters incoming and outgoing network traffic on a specific device. It
applies security rules based on IP addresses, ports, applications, and protocols. Users can configure the
firewall settings to allow or block specific applications from accessing the internet.

Key Features of a Software Firewall


 Application Control: Blocks unauthorized programs from accessing the internet.
 Customizable Security Rules: Allows users to set firewall policies for different applications and
services.
6
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
 Real-Time Threat Detection: Identifies and blocks suspicious activity on the device.
 User-Friendly Interface: Provides easy access to security settings.
 Logging and Alerts: Keeps records of security events and notifies users of potential threats.

Advantages of Software Firewalls


 Easy to Install and Configure: No specialized hardware is required.
 Provides Application-Level Security: Allows users to control internet access for specific programs.
 Affordable: Most operating systems, such as Windows and macOS, come with a built-in firewall.
 Ideal for Personal and Small Business Use: Protects individual devices effectively.

Disadvantages of Software Firewalls


 Consumes System Resources: Running a firewall on a device can slow down performance.
 Limited Network Protection: Only secures the device it is installed on.
 Less Effective Against Advanced Attacks: Since it operates at the software level, it can be
bypassed by sophisticated malware.

Examples of Software Firewalls


 Windows Defender Firewall (Built into Windows OS)
 Norton Security Firewall
 McAfee Firewall
 Comodo Firewall

Software firewalls are commonly used in personal computers, small businesses, and individual devices
where network-wide security is not required.

Windows Firewall(Windows Defender Firewall)


Windows Firewall, now known as Windows Defender Firewall, is a built-in security feature in Microsoft
Windows operating systems. It helps protect computers from unauthorized network access, malware, and
cyber threats by filtering incoming and outgoing network traffic based on predefined security rules. Introduced
with Windows XP, it has been continuously improved in later versions, including Windows 10 and Windows
11, to provide better protection and integration with Windows Security.
Features of Windows Defender Firewall
1. Inbound and Outbound Traffic Filtering
Windows Defender Firewall controls incoming and outgoing network traffic. It ensures that only trusted
applications and services can communicate with the network, blocking unauthorized access attempts.
2. Application-Based Filtering
Users can create rules to allow or block specific applications from accessing the internet. This helps in
preventing malware or unauthorized programs from sending data over the network.
3. Network Profiles (Domain, Private, Public)
 Domain Network: Used when connected to an organization’s network with a domain controller.
 Private Network: Applied to trusted networks like home or office Wi-Fi.
 Public Network: The most restrictive profile, used for untrusted networks like public Wi-Fi to
7
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
prevent unauthorized access.
4. Port and Protocol Control
Users can block or allow specific ports and protocols (e.g., TCP, UDP) to prevent cyber threats like
unauthorized remote access, brute-force attacks, and malware infections.
5. Advanced Security Rules
Windows Defender Firewall includes an Advanced Security Console, allowing administrators to configure
detailed firewall rules, monitor active connections, and define IP-based filtering.
6. Logging and Monitoring
The firewall maintains logs of network activity, helping users track attempted intrusions, blocked
connections, and firewall rule enforcement.
7. Integration with Windows Security & Defender Antivirus
Windows Defender Firewall works with Microsoft Defender Antivirus to provide real-time protection
against malware, spyware, and hacking attempts.

How Windows Defender Firewall Works


1. Traffic Inspection
When a data packet tries to enter or exit the computer, the firewall examines its source, destination, and
content to determine if it should be allowed or blocked.
2. Rule-Based Access Control
The firewall follows predefined security rules to allow or deny network access to applications, services, and
IP addresses.
3. Blocking Malicious Traffic
If an unknown or potentially harmful program tries to connect to the internet, Windows Defender Firewall
blocks the connection and notifies the user.
4. Custom Rule Configuration
Users can create custom rules to restrict network access for specific applications or block certain websites
and IP addresses.

8
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI

2.0 AIM of Micro-Project

The aim of this project is to equip students with practical knowledge of firewall configuration and security
management using Windows Defender Firewall. It provides hands-on experience in network protection, traffic
control, and rule-based access management, enhancing both technical and problem-solving skills in
cybersecurity. By the end of the project, students will gain expertise in securing Windows systems and
implementing effective firewall strategies to prevent cyber threats.

9
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI

3.0 Course Outcomes (CO)

d. Apply measures to prevent attacks on network using Firewall.

10
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI

4.0 Procedure Followed

Step 1: Press Win+R to open the Run search utility.


Step 2: Use the command Firewall.cpl and hit enter to open Windows Defender Firewall settings instantly

Step 3: The screen that pops up gives a summary of current connection and the status of your Firewalls.
Step 4: From the left pane, click on Advanced Settings to view your firewall’s current configuration. You may
be asked for Admin permission via User Account Control. Click Yes to access.

11
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI

Step 5: When you open Advanced Options, you may find a Window with a detailed overview of your firewall.
The left pane has options to access all the rules, the center gives you information on the current status based
on each profile, and the right pane is for actions, allowing you to interact with the configuration.

12
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI

Step 6: To check Inbound Rules active on your PC, you first have to select Inbound Rules from the left pane.
This will give you a list of all the services that have inbound rules set for them. Similarly, you can find the list
of Outbound rules by clicking on it from the left pane.

Step 7: After checking all the rules, you can create a new rule as you see fit. All you have to do is select the
type of rule you want to create. For instance,navigate to the type of rule you want from the left
pane. Step 8 – Navigate to Inbound rules from the left pane and then use the New Rule button from the right.

Step 9—The new rule wizard will appear on your screen. You first need to specify what exactly the rule is
for. If it is for programs, you click on next. If it is for a port or anything else, mark it and click next.
13
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI

Step 10 – In the next step, you need to select an action, whether you want the network to connect directly,
connect if it is safe, or not connect at all when your rule is active.

14
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
Step 11 – After specifying your rule, you need to specify when this rule will come into action, i.e., whether
you want it to work in Domain, Public, or Private networks.

Right-clicking on a rule allows you to access and disable/enable it. You can also check the rule’s properties to
configure it better. Setting these rules at your convenience gives you a sense of security. If you find it
difficult to configure the firewall properly, you can always use the default settings.

If you have made any changes by mistake, you can restore default settings by closing the advanced options
window and opening Windows Defender Firewall. From the left pane, click Restore Defaults, and you’re
ready!

15
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI

5.0 Resources Used

Sr. No Name Specification Qty Remarks


of
Resource

1 Computer 500GB HDD,


4 Gb RAM,
AMD processor,
Windows 7 OS
2 Software Windows Defender 1
Firewall

3 Software Windows Control Panel 1

16
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI

6.0 Outputs of Microproject

Successfully configured Windows firewall on the Laptop as well as Computer system in Windows 11.

17
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI

7.0 Skill Developed

Through this microproject, we developed essential skills in firewall security and network protection,
enhancing our understanding of cybersecurity. We gained technical expertise in configuring our Windows
Defender Firewall, managing our network security settings, and controlling our inbound and outbound
traffic. Our problem-solving abilities improved as we troubleshot our firewall configurations, identified
our security threats, and resolved our access issues. Additionally, we enhanced our cybersecurity
awareness by recognizing threats like malware and hacking attempts while learning best practices for our
network security. By the end of the project, we had strengthened our cybersecurity knowledge, equipping
us to secure our systems, protect our data, and maintain our safe digital environment.

18
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,

You might also like