Skip to content

Commit dd1ef8a

Browse files
Resolved #6 and #8
1 parent 008e135 commit dd1ef8a

File tree

2 files changed

+24
-1
lines changed

2 files changed

+24
-1
lines changed

.markdownlint.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,9 @@
88
"$comment": "Allow long lines for code blocks.",
99
"line_length": 120,
1010
"tables": false
11+
},
12+
"MD033": {
13+
"$comment": "Allow inline HTML for MkDocs compatibility.",
14+
"allowed_elements": [ "br", "sup" ]
1115
}
1216
}

ADDS/README.md

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ keywords:
3232
| 2025-01-11 | 1.3 | M. Grafnetter | Improved [helper scripts](#dcfwtool-distribution-contents).<br>Added the [Port Scanning](#port-scanning) and expanded the [System Reboots](#system-reboots) sections. |
3333
| 2025-02-24 | 1.3.1 | P. Formanek | Expanded the [Firewall Rule Merging](#firewall-rule-merging) section. |
3434
| 2025-03-19 | 1.3.2 | P. Formanek,<br>M. Grafnetter | Tested on Windows 2025 Server and expanded the [IPSec](#ipsec-rules) and [System Reboots](#system-reboots) sections. |
35+
| 2025-05-09 | 1.3.3 | M. Grafnetter | Expanded the [RPC Dynamic Port Allocation](#rpc-dynamic-port-allocation) and [Firewall Profiles](#firewall-profiles) sections. |
3536

3637
Script files referenced by this document are versioned independently:
3738

@@ -473,6 +474,14 @@ to avoid potential loss of network connectivity.
473474

474475
![Windows Firewall profiles](../Images/Screenshots/firewall-profiles.png){ width=400px }
475476

477+
Additionally, some experts suggest [applying the following undocumented NLA setting](https://glennopedia.com/2024/06/01/network-location-awareness-service-revisited/),
478+
although this may be redundant with the aforementioned recommendation:
479+
480+
> HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\NlaSvc\\Parameters
481+
> Value name: AlwaysExpectDomainController
482+
> Value type: REG_DWORD
483+
> Value data: 1
484+
476485
### Infeasibility of Outbound Traffic Filtering
477486

478487
#### Reasons for Blocking Outbound Traffic
@@ -679,6 +688,17 @@ References:
679688
- [Setting Up a Fixed Port for WMI](https://learn.microsoft.com/en-us/windows/win32/wmisdk/setting-up-a-fixed-port-for-wmi)
680689
- [RPC Load Balancing Best Practices](https://learn.microsoft.com/en-us/windows/win32/rpc/load-balancing-best-practices)
681690

691+
### RPC Dynamic Port Allocation
692+
693+
For most Windows services, it is not possible to specify a dedicated RPC server port.
694+
Some network administrators prefer to at least [change the system-wide RPC dynamic port range](https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/configure-rpc-dynamic-port-allocation-with-firewalls)
695+
from the default 49152-65535 interval to a narrower one, such as 5000-6000.
696+
697+
However, this approach does not seem to provide any security benefits.
698+
Restricting the RPC port range does not prevent any hacking techniques or mitigate any security vulnerabilities,
699+
nor does it simplify the configuration of network firewalls.
700+
We have therefore decided against including this setting in the `DCFWTool`.
701+
682702
### RPC Filters
683703

684704
#### RPC over Named Pipes
@@ -2881,7 +2901,6 @@ To simplify this process, the `Update-ADDSFirewallPolicy.bat` script contains al
28812901
> at least one reboot is still necessary for the firewall to start logging dropped packets,
28822902
> even if the `Update-ADDSFirewallPolicy.bat` script is executed.
28832903
2884-
28852904
### Multi-Domain Forests
28862905
28872906
The firewall policy can be deployed to multiple AD domains at once.

0 commit comments

Comments
 (0)