O'Reilly logo

Microsoft® Windows® Group Policy Guide by William R. Stanek, Derek Melber, Darren Mar-Elia, The Microsoft Group Policy Team

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding Windows Firewall Policy

Most organizations have firewall and proxies in place to help protect the internal network from intruders. When users or computers connect indirectly to the Internet through these firewalls and proxies, you can be reasonably sure the computers are protected from attacks and malicious users. When users or computers connect directly to the Internet, however, these protections might not apply. For example, if a user takes a portable computer to an offsite meeting or uses a portable computer on a coffee shop wireless network while at lunch, the computer isn’t automatically protected from attack or intrusion. If the infected computer is reconnected to the internal network, it can infect other computers, bypassing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required