Nis Microproject
Nis Microproject
Micro Project
On
“SETTING UP A FIREWALL USING WINDOWS
DEFENDER”
Submitted in partial fulfillment of the requirement for the award of
Diploma of Engineering
In
Computer Engineering
By
SHAIKH MOHAMMAD SALMAN
RAUT AARYA
PATIL SRUSHTI
SAINDANE VINAYAK
GUJAR ANUSHA
GROUP MEMBERS
PART –A PLAN
1 Brief Introduction 1
3 Resources Required 4
PART –B OUTCOMES
1 Brief Description 5
2 Aim of Micro-Project 9
6 Outpus of Microproject 17
7 Skill Developed 18
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS 22620, Sem VI
PART-A PLAN
A firewall is a network security system that monitors and controls incoming and outgoing network traffic
based on predefined security rules. It acts as a protective barrier between a trusted internal network and
untrusted external networks, such as the internet. The primary function of a firewall is to block unauthorized
access while allowing legitimate communications to pass through. Firewalls are essential in both personal and
organizational settings to prevent cyber threats, data breaches, and malware attacks. They work by inspecting
data packets, analyzing their source and destination, and determining whether they should be allowed or
denied based on security policies.
Firewalls can be hardware-based or software-based. A hardware firewall is a physical device installed between
a network and an external connection, such as a router. It is commonly used in businesses and large
organizations to provide network-wide protection. A software firewall, on the other hand, is a program
installed on an individual device, such as a computer or server. It monitors and filters network traffic specific
to that device. Both types of firewalls play a crucial role in preventing hackers, malware, and unauthorized
users from accessing sensitive information.
Features of a Firewall
A firewall provides several essential features to enhance network security. One of the most important features
is packet filtering, which allows or blocks data packets based on security rules. Firewalls can also perform
stateful inspection, where they track active connections and determine whether new packets belong to an
existing session. Another key feature is access control, which allows administrators to define which
applications, websites, or IP addresses can access a network. Firewalls also help in intrusion prevention,
blocking suspicious activities before they can compromise the system. Additionally, firewalls provide logging
and monitoring, which helps network administrators track traffic patterns and detect security breaches.
Firewalls use different techniques to enforce security, such as proxy filtering, where the firewall acts as an
intermediary between a device and the internet, and deep packet inspection (DPI), which examines the content
of data packets to detect malicious activity. With the growing number of cyber threats, modern firewalls,
known as Next-Generation Firewalls (NGFWs), include advanced security features like AI-driven threat
detection, malware scanning, and VPN support. These features ensure that firewalls not only block
unauthorized access but also protect against sophisticated cyber threats.
One of the key advantages of Windows Defender Firewall is its user-friendly interface, allowing users to easily
VIVA COLLEGE OF DIPLOMA ENGG & 1
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS 22620, Sem VI
create and manage inbound and outbound rules. These rules define which applications and services can access
the internet or communicate with other networks. Users can also block or allow specific IP addresses,
protocols, and ports, enhancing network security. Additionally, Windows Defender Firewall includes
Advanced Security settings, where IT administrators can configure policies for domain networks, private
networks, and public networks.
Windows Defender Firewall is an essential security tool for both home users and businesses. It helps prevent
unauthorized remote access, stops malware from spreading through the network, and enhances overall system
security. By enabling firewall logging and alerts, users can track suspicious activities and take immediate
action to mitigate risks. Combined with Windows Security features, such as antivirus protection and Windows
Defender SmartScreen, the firewall provides comprehensive security for Windows users.
In conclusion, a firewall is a crucial component of cybersecurity that protects systems from unauthorized
access and malicious attacks. Its ability to monitor, filter, and control network traffic ensures that users and
organizations remain safe from cyber threats. Windows Defender Firewall, as a built-in security solution,
provides an effective and user-friendly approach to firewall management, making it an essential tool for
securing Windows computers. As cyber threats continue to evolve, firewalls will remain a fundamental
defense mechanism in ensuring network security and protecting sensitive data.
The aim of this project is to equip students with practical knowledge of firewall configuration and security
management using Windows Defender Firewall. It provides hands-on experience in network protection, traffic
control, and rule-based access management, enhancing both technical and problem-solving skills in
cybersecurity. By the end of the project, students will gain expertise in securing Windows systems and
implementing effective firewall strategies to prevent cyber threats.
PART-B OUTCOME
What is a Firewall?
A firewall is a network security system that monitors and controls incoming and outgoing network traffic
based on predefined security rules. It acts as a protective barrier between a trusted internal network and
untrusted external networks, such as the internet. The primary function of a firewall is to block unauthorized
access while allowing legitimate communications to pass through. Firewalls are essential in both personal and
organizational settings to prevent cyber threats, data breaches, and malware attacks. They work by inspecting
data packets, analyzing their source and destination, and determining whether they should be allowed or
denied based on security policies.
1. Hardware Firewall
A hardware firewall is a physical device that is installed between a network and an external connection, such
as the internet. It functions independently from the devices it protects and is typically used by businesses,
enterprises, and data centers to provide network-wide security.
How It Works ?
A hardware firewall is integrated into network equipment, such as routers or dedicated firewall appliances.
It inspects incoming and outgoing data packets, determining whether to allow or block them based on a set of
security rules. Since it operates at the network level, it provides protection to all devices connected to the
network, including computers, servers, and IoT devices.
5
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
1. Stronger Security: Hardware firewalls operate independently from the operating system, making them
less vulnerable to attacks.
2. Protects Multiple Devices: Since it works at the network level, a single firewall can protect an entire
organization.
3. Prevents Unauthorized Access: Blocks threats before they reach internal devices.
Improves Performance: Reduces the load on individual devices by handling security at the network level.
3. Not Suitable for Individuals: Best suited for organizations rather than personal use.
Hardware firewalls are ideal for large organizations, data centers, and corporate networks that require
centralized security for multiple devices.
2. Software Firewall
A software firewall is a program installed on an individual computer or server to control network traffic
and prevent unauthorized access. Unlike hardware firewalls, software firewalls operate at the device level,
providing security for a single system rather than an entire network.
How It Works?
A software firewall monitors and filters incoming and outgoing network traffic on a specific device. It
applies security rules based on IP addresses, ports, applications, and protocols. Users can configure the
firewall settings to allow or block specific applications from accessing the internet.
Software firewalls are commonly used in personal computers, small businesses, and individual devices
where network-wide security is not required.
8
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
The aim of this project is to equip students with practical knowledge of firewall configuration and security
management using Windows Defender Firewall. It provides hands-on experience in network protection, traffic
control, and rule-based access management, enhancing both technical and problem-solving skills in
cybersecurity. By the end of the project, students will gain expertise in securing Windows systems and
implementing effective firewall strategies to prevent cyber threats.
9
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
10
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
Step 3: The screen that pops up gives a summary of current connection and the status of your Firewalls.
Step 4: From the left pane, click on Advanced Settings to view your firewall’s current configuration. You may
be asked for Admin permission via User Account Control. Click Yes to access.
11
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
Step 5: When you open Advanced Options, you may find a Window with a detailed overview of your firewall.
The left pane has options to access all the rules, the center gives you information on the current status based
on each profile, and the right pane is for actions, allowing you to interact with the configuration.
12
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
Step 6: To check Inbound Rules active on your PC, you first have to select Inbound Rules from the left pane.
This will give you a list of all the services that have inbound rules set for them. Similarly, you can find the list
of Outbound rules by clicking on it from the left pane.
Step 7: After checking all the rules, you can create a new rule as you see fit. All you have to do is select the
type of rule you want to create. For instance,navigate to the type of rule you want from the left
pane. Step 8 – Navigate to Inbound rules from the left pane and then use the New Rule button from the right.
Step 9—The new rule wizard will appear on your screen. You first need to specify what exactly the rule is
for. If it is for programs, you click on next. If it is for a port or anything else, mark it and click next.
13
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
Step 10 – In the next step, you need to select an action, whether you want the network to connect directly,
connect if it is safe, or not connect at all when your rule is active.
14
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
Step 11 – After specifying your rule, you need to specify when this rule will come into action, i.e., whether
you want it to work in Domain, Public, or Private networks.
Right-clicking on a rule allows you to access and disable/enable it. You can also check the rule’s properties to
configure it better. Setting these rules at your convenience gives you a sense of security. If you find it
difficult to configure the firewall properly, you can always use the default settings.
If you have made any changes by mistake, you can restore default settings by closing the advanced options
window and opening Windows Defender Firewall. From the left pane, click Restore Defaults, and you’re
ready!
15
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
16
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
Successfully configured Windows firewall on the Laptop as well as Computer system in Windows 11.
17
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,
SETTING UP A FIREWALL USING WINDOWS DEFENDER NIS, 22620, Sem VI
Through this microproject, we developed essential skills in firewall security and network protection,
enhancing our understanding of cybersecurity. We gained technical expertise in configuring our Windows
Defender Firewall, managing our network security settings, and controlling our inbound and outbound
traffic. Our problem-solving abilities improved as we troubleshot our firewall configurations, identified
our security threats, and resolved our access issues. Additionally, we enhanced our cybersecurity
awareness by recognizing threats like malware and hacking attempts while learning best practices for our
network security. By the end of the project, we had strengthened our cybersecurity knowledge, equipping
us to secure our systems, protect our data, and maintain our safe digital environment.
18
VIVA COLLEGE OF DIPLOMA ENGG &
TECH,