Free Essay

Capital Acquisition and Repayment Cycle

In:

Submitted By allynotezz
Words 4906
Pages 20
Windows XP
OEM Preinstallation Kit
Design Notes
Microsoft( Windows( Family of Operating Systems

Using the Windows Firewall .Inf File in Microsoft® Windows® XP
Service Pack 2

MICROSOFT CONFIDENTIAL - PROVIDED UNDER NDA
DO NOT REDISTRIBUTE

July 14, 2004

Abstract:

Microsoft Windows XP Service Pack 2 (SP2) includes significant enhancements to the Windows Firewall component (formerly known as the Internet Connection Firewall). Windows Firewall is a stateful host firewall that discards unsolicited incoming traffic, providing a level of protection for computers against malicious users or programs. To provide better protection for computers connected to any kind of network (such as the Internet, a home network, or an organization network), Windows XP SP2 enables Windows Firewall on all network connections by default. Network administrators can use the Windows Firewall .inf file (Netfw.inf) to modify default settings either before installation or after installation. This article describes the usage of the Windows Firewall .inf file.

The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.

This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT.

Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.

Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.

Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred.

© 2004 Microsoft Corporation. All rights reserved.

Microsoft, Win32, Windows, and Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States or other countries or regions.

The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

Contents

Overview 4
Scenarios for Modifying Default Windows Firewall Configuration 4
Location of Windows Firewall .Inf File 5
Methods for Replacing the Default Windows Firewall Configuration 5
Default Windows Firewall .Inf File 6
Configuration Options Provided in the Windows Firewall .Inf File 7 Changing Windows Firewall’s Default Operational Mode 7 Disabling Windows Firewall’s Notifications 8 Blocking Unicast Responses to Multicast and Broadcast Packets 9 Enabling Remote Administration 9 Allowing ICMP Messages through Windows Firewall 10 Adding Static Ports to Windows Firewall’s Default Exceptions List 11 Adding Programs to Windows Firewall’s Default Exceptions List 12
Defining the Scope for an Entry in the Windows Firewall .Inf File 14
Summary 15
Related Links 15

Overview

Windows XP Service Pack 2 (SP2) includes significant enhancements to Windows Firewall, formerly known as the Internet Connection Firewall (ICF). Windows Firewall is a stateful, host-based firewall that drops all unsolicited, incoming traffic that does not correspond to either traffic sent in response to a request of the computer (solicited traffic) or unsolicited traffic that has been specified as allowed (excepted traffic). This behavior of Windows Firewall provides a level of protection from malicious users and programs that rely on unsolicited, incoming traffic to attack computers.

A new feature in Windows XP SP2 is the enabling of Windows Firewall by default during an installation of Windows XP or during an update to Windows XP SP2. Because Windows Firewall is enabled by default, network administrators need the flexibility to modify the default configuration of Windows Firewall during the installation of Windows XP SP2 and after its installation. Typical configuration modifications include adding programs to Windows Firewall’s exception list or disabling Windows Firewall, for example, if a third-party, host-based firewall is already installed and enabled.

Windows Firewall can be preconfigured by modifying the Windows Firewall .inf file, named Netfw.inf, in which Windows Firewall’s default configuration is stored. During an installation of or an update to Windows XP SP2, Windows Firewall imports its configuration from this .inf file. This means that any modifications made to the Windows Firewall .inf file before an installation of Windows will automatically be incorporated into the default configuration of Windows Firewall.

Scenarios for Modifying Default Windows Firewall Configuration

The following are common scenarios for modifying the default configuration of Windows Firewall.

Third-Party Firewall-Enabled

An original equipment manufacturer (OEM) may choose to provide its customers with a third-party, host-based firewall. If this firewall is enabled by default, then it is recommended that Windows Firewall be disabled. This can be done by modifying the Windows Firewall .inf file to disable Windows Firewall by default.

Preinstalled Programs

An OEM or enterprise may choose to install a suite of programs by default. Some of these programs may need to receive unsolicited, incoming traffic in order to function correctly. Windows Firewall can be configured to enable specific, unsolicited, incoming traffic by default by adding the programs to the Windows Firewall’s exceptions list. This can be done by adding entries for the programs to the Windows Firewall .inf file. Only programs that require unsolicited, incoming traffic should be added to the exceptions list; programs that do not require unsolicited, incoming traffic should not be added to the exceptions list.

Pre-Opened Ports

An enterprise may choose to use various network services and want to ensure that the network traffic for those services is enabled by default through Windows Firewall. For example, an enterprise may use some of the remote management functionality included in Windows XP. You can configure Windows Firewall to open the necessary ports by default by adding them to the Windows Firewall’s exceptions list. Specifically, you can add entries for the TCP or UDP ports to the Windows Firewall .inf file. Statically opening ports does potentially increase a computer’s exposure to attack, so the number of ports opened in Windows Firewall by default should be at a minimum.

Location of Windows Firewall .Inf File

On a Windows XP CD image, the location of the Windows Firewall .inf file is:

Cd_drive:\I386\Netfw.in_

Note: On a Windows XP CD image, the file’s name is Netfw.in_ (not Netfw.inf). This is for signing purposes. If an OEM modifies this file, the file must also be re-signed.

After the installation of Windows XP SP2, the location of the Windows Firewall .inf file is:

%WINDIR%\Inf\Netfw.inf

Methods for Replacing the Default Windows Firewall Configuration

Method 1: Pre-Installation
1. Copy the default Windows Firewall .inf file (Netfw.in_) from a Windows XP SP2 CD image.
2. Make the desired modifications to the .inf file. Directions for modifying the .inf file are provided in the "Configuration Options Provided in the Windows Firewall .Inf File" section of this article.
3. Save the modified .inf file as Netfw.in_.
4. Sign the modified Netfw.in_.
5. Replace the default Netfw.in_ with the modified Netfw.in_ in the Windows XP SP2 CD image.
6. Install Windows XP SP2 from the modified Windows XP SP2 CD image.

Method 2: Post-Installation
1. Copy the default Windows Firewall .inf file (Netfw.inf) from an installation of Windows XP SP2.
2. Make the desired modifications to the .inf file. Directions for modifying the .inf file are provided in the "Configuration Options Provided in the Windows Firewall .Inf File" section of this article.
3. Save the modified .inf file as Netfw.inf.
4. Replace the default Netfw.inf with the modified Netfw.inf in the installation of Windows XP SP2.
5. Run the netsh firewall reset command on the computer running Windows XP SP2. You can do this manually by typing the command at a command prompt or by including the command in a run-once script.

Default Windows Firewall .Inf File

The default contents of the Netfw.inf file are the following:

[Version] Signature = "$Windows NT$" DriverVer =07/01/2001,5.1.2600.2132

[DefaultInstall] AddReg = ICF.AddReg.DomainProfile AddReg = ICF.AddReg.StandardProfile

[ICF.AddReg.DomainProfile] HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List","%WINDIR%\system32\sessmgr.exe",0x00000000,"%WINDIR%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll.-22019"

[ICF.AddReg.StandardProfile] HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List","%WINDIR%\system32\sessmgr.exe",0x00000000,"%WINDIR%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll.-22019"

The first two sections of Netfw.inf contain versioning and configuration information, and do not need to be modified. The sections that are significant for modifying the default configuration for Windows Firewall are the following:

• [ICF.AddReg.DomainProfile] – Windows Firewall maintains two sets of configuration known as profiles. One profile is used when a computer is connected to the domain to which it is joined, while the other profile is used when the computer is not connected to its domain. This section is for defining changes to Windows Firewall’s default configuration when a computer is connected to a network that contains its domain.

• [ICF.AddReg.StandardProfile] – This section is for defining changes to Windows Firewall’s default configuration when a computer is not connected to a network that contains its domain. If a computer is not a member of a domain, then Windows Firewall will always enforce the configuration stored in the Standard Profile.

Configuration Options Provided in the Windows Firewall .Inf File

The majority of the default configurations for Windows Firewall can be defined in the Windows Firewall .inf file. This includes the following settings:

• Operational mode

• Disable notifications

• Block unicast responses to multicast and broadcast packets

• Enable Remote Administration

• Enable ICMP messages

• Open ports

• Enable programs

These settings are described in the next sections.

Notes: All of the settings made in the Windows Firewall .inf file will be applied to all of a computer’s network interfaces.

You cannot open ports nor enable ICMP messages for individual interfaces through the Windows Firewall .inf file.

Logging settings cannot be defined through the Windows Firewall .inf file.

Changing Windows Firewall’s Default Operational Mode

• Windows Firewall can be placed in one of three operational modes:

• On – This is the default operational mode for Windows Firewall. In this mode, Windows Firewall drops all unsolicited, incoming traffic, except those matching enabled entries in Windows Firewall’s exceptions lists. Because this is the default operational mode, no entries need to be included in the Windows Firewall .inf file.

• The assumed entries for the Domain Profile in the [ICF.AddReg.DomainProfile] section of the Windows Firewall .inf file are:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile","DoNotAllowExceptions",0x00010001,0

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile","EnableFirewall",0x00010001,1

• The assumed entries for the Standard Profile in the [ICF.AddReg.StandardProfile] section of the Windows Firewall .inf file are:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile","DoNotAllowExceptions",0x00010001,0

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile","EnableFirewall",0x00010001,0x00000001

• On with No Exceptions – In this mode, Windows Firewall blocks all unsolicited, incoming traffic, even those matching enabled entries in Windows Firewall’s exceptions lists.

• To make this the default operational mode for the Domain Profile, add the following entries to the [ICF.AddReg.DomainProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile","DoNotAllowExceptions",0x00010001,1

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile","EnableFirewall",0x00010001,1

• To make this the default operational mode for the Standard Profile, add the following entries to the [ICF.AddReg.StandardProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile","DoNotAllowExceptions",0x00010001,1

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile","EnableFirewall",0x00010001,1

• Off – In this mode, Windows Firewall is disabled and does not do any filtering of unsolicited, incoming traffic. All unsolicited, incoming traffic is enabled, and Windows Firewall does not help to protect the computer from network attacks.

• To make this the default operational mode for the Domain Profile, add the following entries to the [ICF.AddReg.DomainProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile","DoNotAllowExceptions",0x00010001,0

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile","EnableFirewall",0x00010001,0

• To make this the default operational mode for the Standard Profile, add the following entries to the [ICF.AddReg.StandardProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile","DoNotAllowExceptions",0x00010001,0

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile","EnableFirewall",0x00010001,0

Disabling Windows Firewall’s Notifications

By default, Windows Firewall displays a notification to users when a program not already included in the Windows Firewall exceptions list uses the new Windows Firewall APIs to add itself or its traffic to an exceptions list. By adding the appropriate entries to the Windows Firewall .inf file, these notifications can be disabled in either or both of Windows Firewall’s profiles.

• To disable notifications by default in the Domain Profile, add the following entry to the [ICF.AddReg.DomainProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile","DisableNotifications",0x00010001,1

• To disable notifications by default in the Standard Profile, add the following entry to the [ICF.AddReg.StandardProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile","DisableNotifications",0x00010001,1

Blocking Unicast Responses to Multicast and Broadcast Packets

By default, Windows Firewall enables incoming, unicast-response packets to a port for three seconds after a multicast or broadcast packet is sent from the port. By adding the appropriate entries to the Windows Firewall .inf file, this behavior can be disabled in either or both of Windows Firewall’s profiles.

• To block unicast responses to multicast and broadcast packets by default in the Domain Profile, add the following entry to the [ICF.AddReg.DomainProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile","DisableUnicastResponsesToMulticastBroadcast",0x00010001,1

• To block unicast responses to multicast and broadcast packets by default in the Standard Profile, add the following entry to the [ICF.AddReg.StandardProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile","DisableUnicastResponsesToMulticastBroadcast",0x00010001,1

Enabling Remote Administration

Windows Firewall includes a Remote Administration option that alters its configuration to enable Remote Procedure Call (RPC) and Distributed Component Object Model (DCOM) communication. Enabling this option statically opens TCP 135 and TCP 445 to unsolicited, incoming traffic. Additionally, communication over named pipes is permitted, and ports are dynamically opened as needed by Windows services using RPC. By adding the appropriate entries to the Windows Firewall .inf file, you can enable the Remote Administration option in either or both of Windows Firewall’s profiles.

• To enable Remote Administration by default in the Domain Profile, add the following entry to the [ICF.AddReg.DomainProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\RemoteAdminSettings","Enabled",0x00010001,1

• To enable Remote Administration by default in the Standard Profile, add the following entry to the [ICF.AddReg.StandardProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\RemoteAdminSettings","Enabled",0x00010001,1

When enabling Remote Administration, the set of IP addresses from which unsolicited, incoming traffic is accepted can also be specified through an additional entry in the appropriate section of the Windows Firewall .inf file.

To define the default scope for Remote Administration in the Domain Profile, add the following entry to the [ICF.AddReg.DomainProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\RemoteAdminSettings","RemoteAddresses",0x00000000,scope

To define the default scope for Remote Administration in the Standard Profile, add the following entry to the [ICF.AddReg.StandardProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\RemoteAdminSettings","RemoteAddresses",0x00000000,scope

Permitted values for scope are defined in the “Defining the Scope for an Entry in the Windows Firewall .Inf File" section of this article.

Allowing ICMP Messages through Windows Firewall

While the default configuration for Windows Firewall blocks all ICMP message types, you can modify this behavior by adding entries to the Windows Firewall .inf file that enable certain ICMP message types by default.

To enable an ICMP message type by default in the Domain Profile, add the following entry to the [ICF.AddReg.DomainProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\IcmpSettings","ICMP Message Type",0x00010001,1

To enable an ICMP message type by default in the Standard Profile, add the following entry to the [ICF.AddReg.StandardProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\IcmpSettings","ICMP Message Type",0x00010001,1

Both of these entries require an ICMP Message Type to be specified. The permitted values for ICMP Message Type are listed in Table 1.

Table 1. ICMP Message Types

|ICMP Message Type |Number |Description |
|AllowOutboundPacketTooBig |2 |When an Internet Protocol version 6 (IPv6) packet|
| | |is too large to be forwarded, data is dropped and|
| | |a computer replies to the sender with a Packet |
| | |Too Big message. |
|AllowOutboundDestinationUnreachable |3 |Sent data that fails to reach this computer due |
| | |to an error is discarded and reported with a |
| | |Destination Unreachable message explaining the |
| | |failure. |
|AllowOutboundSourceQuench |4 |When a computer’s ability to process incoming |
| | |data cannot keep up with the rate of a |
| | |transmission, data is dropped and the sender is |
| | |asked to transmit more slowly. |
|AllowRedirect |5 |Data sent from a computer is rerouted. |
|AllowInboundEchoRequest |8 |Messages sent to a computer are repeated back to |
| | |the sender. This is commonly used for |
| | |troubleshooting (for example, to ping a |
| | |computer). |
|AllowInboundRouterRequest |10 |A computer responds to router discovery messages.|
|AllowOutboundTimeExceeded |11 |When a computer discards a packet because its hop|
| | |count was exceeded or it ran out of time to |
| | |assemble fragments of a packet, it replies to the|
| | |sender with a Time Exceeded message. |
|AllowOutboundParameterProblem |12 |When a computer discards data that it has |
| | |received because of a problematic header, it |
| | |replies to the sender with a Parameter Problem |
| | |error message. |
|AllowInboundTimestampRequest |13 |A confirmation message is sent, indicating the |
| | |time that the data was received at a computer. |
|AllowInboundMaskRequest |17 |A computer listens for and responds to requests |
| | |for a network subnet mask. |

Adding Static Ports to Windows Firewall’s Default Exceptions List

In Windows XP SP2, Windows Firewall maintains an exceptions list for each of its two profiles. When in normal operation, Windows Firewall statically opens ports that are included in its current profile’s exceptions list. It is generally recommended that programs be added to the exceptions list, instead of statically opening ports. This enables Windows Firewall to open and close ports dynamically and to minimize the number of ports open at any one time. It is recognized, however, that there are scenarios in which ports need to be statically opened. For example, a static port may need to be opened in order for a Windows service to receive unsolicited, incoming traffic. To support such scenarios, OEMs have the ability to add static ports to either or both of Windows Firewall’s default exceptions lists through the Windows Firewall .inf file.

To add a static port to the Domain Profile’s exceptions list, an entry in the following format should be added to the [ICF.AddReg.DomainProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\GloballyOpenPorts\List","port number:protocol",0x00000000, "port number:protocol:scope:mode:port’s friendly name"

To add a static port to the Standard Profile’s exceptions list, an entry in the following format should be added to the [ICF.AddReg.StandardProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List","port number:protocol",0x00000000, "port number:protocol:scope:mode:port’s friendly name"

In the two entries above, the following elements must be defined, based upon the port added to Windows Firewall’s default exceptions lists and the desired behavior:

• port number – A port is specified by the combination of a protocol and a port number. The port number must be between 1 and 65535 inclusive.

• protocol – A port is specified by the combination of a protocol and a port number. The protocol must be either TCP or UDP.

• scope – Permitted values for scope are defined in the “Defining the Scope for an Entry in the Windows Firewall .Inf File” section of this article.

• mode – An entry can be added to Windows Firewall’s default exceptions lists as either enabled or disabled. The two permitted values for this element are Enabled and Disabled. If a port’s entry is enabled, the port will be statically opened in Windows Firewall. If a port’s entry is disabled, the port will not be statically opened in Windows Firewall.

• port’s friendly name – This is the description that will be used to represent the entry for Windows Firewall in Control Panel. It should provide an indication of why the port is statically opened, such as "Web Server (TCP 80)" or "Telnet Server (TCP 23)".

As an example for opening a port, two entries are required to enable the static port used by the Internet Key Exchange (IKE) protocol, which uses UDP 500, for a scope of all IP addresses in the default exceptions lists for both of Windows Firewall’s profiles.

This entry is added to the [ICF.AddReg.DomainProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\GloballyOpenPorts\List","500:UDP",0x00000000,"500:UDP:*:enabled:IKE (UDP 500)"

This entry is added to the [ICF.AddReg.StandardProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List","500:UDP",0x00000000, "500:UDP:*:enabled:IKE (UDP 500)"

Adding Programs to Windows Firewall’s Default Exceptions List

In Windows XP SP2, Windows Firewall maintains an exceptions list for each of its two profiles. When in normal operation, Windows Firewall dynamically opens the ports used by programs in its current profile’s exceptions list. The Windows Firewall .inf file can be used to add programs to either or both of Windows Firewall’s default exceptions lists. Only programs that actually require unsolicited, incoming traffic should be added to the exceptions lists; there is no benefit to adding programs that use only outgoing connections to the exceptions lists.

To add a program to the Domain Profile’s exceptions list, an entry in the following format should be added to the [ICF.AddReg.DomainProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List","program’s image path",0x00000000,"program’s image path:scope:mode:program’s friendly name"

To add a program to the Standard Profile’s Exceptions List, an entry in the following format should be added to the [ICF.AddReg.StandardProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List","program’s image path",0x00000000,"program’s image path:scope:mode:program’s friendly name"

In the two entries above, the following elements must be defined, based upon the program added to Windows Firewall’s default exceptions lists and the desired behavior:

• program’s image path – This is the fully qualified path for the file to be added to Windows Firewall’s default exceptions lists. It may include environmental variables, such as %ProgramFiles%.

• scope – Permitted values for scope are defined in the “Defining the Scope for an Entry in the Windows Firewall .Inf File” section of this article.

• mode – An entry can be added to Windows Firewall’s default exceptions lists as either enabled or disabled. The two permitted values for this element are Enabled and Disabled. If a program’s entry is enabled, ports are dynamically opened in Windows Firewall for the program when it opens ports. If a program’s entry is disabled, ports will not be dynamically opened in Windows Firewall for the program.

• program’s friendly name – This is the name that is used to represent the entry in the Windows Firewall user interface. It should include the product name and publisher, such as MSN Messenger v6.1 or AOL Instant Messenger v5.5.

As an example of enabling programs, two entries are included in the Windows Firewall .inf file to enable Remote Assistance with a scope of all IP addresses in the default exceptions lists for both Windows Firewall profiles.

This entry is included in the [ICF.AddReg.DomainProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List","%WINDIR%\system32\sessmgr.exe",0x00000000,"%WINDIR%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"

This entry is included in the [ICF.AddReg.StandardProfile] section of the Windows Firewall .inf file:

HKLM,"SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List","%WINDIR%\system32\sessmgr.exe",0x00000000,"%WINDIR%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"

Defining the Scope for an Entry in the Windows Firewall .Inf File

When enabling Remote Assistance, opening a port, or enabling a program, the set of IP addresses from which the unsolicited, incoming traffic is enabled can be defined. This set of IP addresses from which unsolicited, incoming traffic is enabled is the scope of the exception. There are three options for defining the scope for a Windows Firewall exception.

• All IP addresses – This is the default scope for a Windows Firewall exception, and it enables unsolicited, incoming traffic that matches the exception from any computer. In the Windows Firewall .inf file, making an entry’s scope element an asterisk ("*") results in a scope of all IP addresses for the entry.

• Local subnet only – This scope enables unsolicited, incoming traffic that matches the exception from any computer on the same subnet as the network connection on which the traffic was received through Windows Firewall, while dropping unsolicited, incoming traffic from all other computers. When a computer’s subnet changes, the set of enabled IP addresses dynamically changes to match the new subnet. In the Windows Firewall .inf file, making an entry’s scope element LocalSubnet results in a local subnet-only scope for the entry.

• Custom – The final option is to define a custom scope, which is a list of IPv4 addresses and address ranges that typically correspond to subnets. Unsolicited, incoming traffic that matches the exception and originates from a computer with an IPv4 address in the defined list is enabled through Windows Firewall. Unsolicited, incoming traffic from computers with IPv4 addresses that are not in the list is dropped. A custom scope can include the local subnet (using the "LocalSubnet" string), IPv4 addresses, and IPv4 address ranges, but cannot include IPv6 addresses and IPv6 address ranges. For IPv4 address ranges, you can specify the range using a dotted decimal subnet mask notation or a prefix length (w.x.y.z/n). When you use a dotted decimal subnet mask, you can specify the range as an IPv4 network ID (such as 10.47.81.0/255.255.255.0) or by using an IPv4 address within the range (such as 10.47.81.231/255.255.255.0). When you use a network prefix length, you can specify the range as an IPv4 network ID (such as 10.47.81.0/24) or by using an IPv4 address within the range (such as 10.47.81.231/24). Some examples of custom scope elements include the following:

• 192.168.0.5

• 192.168.0.0/255.255.255.0

• 192.168.0.5,LocalSubnet

• 157.54.0.1,172.16.0.0/12,10.0.0.0/255.0.0.0,LocalSubnet

• 10.91.12.56,10.7.14.9/255.255.255.0,10.116.45.0/255.255.255.0,172.16.31.11/24,172.16.111.0/24

Note: You cannot have any spaces between the entries in the list of sources, or the entire list is ignored and Windows Firewall uses the default scope of any source IPv4 address. This can create an unintended vulnerability. Please double-check your scope syntax before saving changes to the Windows Firewall .inf file.

Summary

To install Windows XP SP2 with customized default settings for the new Windows Firewall or to change settings after installation, use the Windows Firewall .inf file (Netfw.inf). The Windows Firewall .inf file contains two main sections: [ICF.AddReg.DomainProfile] for modifying Windows Firewall settings for the domain profile, [ICF.AddReg.StandardProfile] for modifying settings for the standard profile, and [Strings] for defining strings for some settings. Typical uses of the Windows Firewall .inf file include disabling the Windows Firewall (if a third-party .inf file is already installed and enabled) and adding either programs or ports to the Windows Firewall exceptions lists (one list for each profile).

Related Links

See the following resources for more information:

• Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2 at http://www.microsoft.com/downloads/details.aspx?familyid=4454e0e1-61fa-447a-bdcd-499f73a637d1&displaylang=en

• Manually Configuring Windows Firewall in Windows XP Service Pack 2 at http://www.microsoft.com/technet/community/columns/cableguy/cg0204.mspx

• Windows XP Service Pack 2: Resources for IT Professionals at http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/winxpsp2.mspx

For the latest information about Windows XP, see the Windows XP Web site at http://www.microsoft.com/windowsxp.

Similar Documents

Premium Essay

Solutions Auditing

...instructors in teaching their courses and assessing student learning. Dissemination or sale of any part of this work (including on the World Wide Web) will destroy the integrity of the work and is not permitted. The work and materials from it should never be made available to students except by instructors using the accompanying text in their classes. All recipients of this work are expected to abide by these restrictions and to honor the intended pedagogical purposes and the needs of other instructors who rely on these materials. If you purchased this work within the United States or Canada you should be aware that it has been imported without the approval of the Publisher or the Author. Editorial Director: Natalie Anderson Acquisitions Editor: Julie Broich Editorial Project Manager: Karen Kirincich Production Project Manager: Judy Leale Operations Specialist: Ben Smith Copyright © 2010, 2008, 2006, 2005, 2003 Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper Saddle River, New Jersey 07458. All rights reserved. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval...

Words: 660 - Pages: 3

Premium Essay

Hsm 410

...The four general phases of the working capital cycle are the purchasing of resources that relates to the acquisition of supplies and labor, such as the amount of inventory that is necessary to maintain realistic production schedules and the staff required to ensure adequate provision of services. Production and sale are virtually the same in the healthcare industry; there is no inventory of product of services. Billing represents the interval between the release or discharge of a patient and the generation of a bill. Collection represents the interval between the generation of a bill and the actual collection of the cash from the patient or the patient’s third-party payer. Estimating those four general phases of working capital cycle is critical to cash budgeting and therefore to cash planning. The three primary sources of short-term funds are Single-Payment Loan, which is the simplest credit arrangement and is usually given for a specific purpose, such as the purchase of inventory. The note can be on either a discount or an add-on basis. The discount arrangement, the interest is computed and deducted from the face value of the original loan. The actual proceeds of the loan, then, would be in an amount less than the face of the note. In an add-on note, the interest is added to the final payment of the loan. In this particular arrangement, the borrower receives the full value of the loan when the loan is originated. Lastly, a revolving credit is pretty similar to a...

Words: 469 - Pages: 2

Premium Essay

Chapter 17 Commercial Banking Lending

...calculating APR • We will go over math on Thursday • This math will be the math for Test 4 Cash Conversion Cycle -From investopedia.com (3 definitions) • A metric that expresses the length of time, in days, that takes for a company to convert resource inputs into cash flows • The cash conversion cycle attempts to measure the amount of time each net input dollar is tied up in the production and sales process before it is converted into cash through sales to customers. • This metric looks at the amount of time needed to sell inventory, the amount of time needed to collect receivables and the length of time the company is afforded to pay its bills without incurring penalties. -Commercial and industrial loans represent the earliest form of lending that banks varied out in their more than 2000 years of history -close to 1/5 of commercial bank loans loan portfolio is classified as business or C&I loan Short-Term Business Loans • Self-Liquidating Inventory Loans- business loans, usually to support the purchase of inventories, in which the credit is gradually repaid by the borrowing customer as inventory is sold (60-90 days). o Usually related to the borrowers need for short term cash to finance purchases of inventory or cover production costs, the payment of taxes, interest payments on debt, and dividend payments to stock holders. • Working Capital Loans- loans that provide business with short-term credit lasting from a few days to one year and that re often...

Words: 1278 - Pages: 6

Premium Essay

Capital Structure Recommendation

...Capital Structure Recommendation There are a number of capital structure options available to provide funding for a Canadian expansion. Capital structure strategy should have two main objectives: align with operating strategy and maximize total shareholder returns. Too much debt leverage can lead to credit default and insolvency. Capital financing using bonds has risks because some types of bonds may place responsibility on the company to provide dividends, which could impact shareholder earnings. Capital structure is how operations and growth are financed. Different sources may be used; a combination of long term debt, short term debt, equity and preferred debt. Proper capital structure planning should strengthen the balance sheet, and increase the ability to face loss and change. Based on this strategy, review and analysis of the options presented, the approach of 50% preferred and 50% common stock is recommended. This approach maximizes Earnings Per Share, EPS, or shareholder return. The chart below details the results of using the Canadian Budgeted Earnings, moderate forecast, and calculating a 5 year average Earnings Before Interest and Tax, EBIT, of $112,581. By plugging $112,581 into the Capital Structure Analysis, we see the 50/50 approach maximizes EPS, as detailed in the chart below. The Alternative Capital Resources and EPS chart below presents each option and the expected EPS. For financing using only bonds, the EPS is .045, using 20% bonds EPS is .052,...

Words: 1822 - Pages: 8

Premium Essay

Adjusted Npv

...Features/advantages of WACC. 1. WACC accounts for tax shield benefit of interest in discount rate. 2. WACC is widely adopted by practitioners and is easy to use. 3. WACC is applicable when D/E remains essentially constant through project life. 4. WACC is most appropriate when the project is “typical” of the firms traditional businesses (i.e., same risk), or “scale enhancing”. • Features/advantages of APV. 1. APV accounts for tax shield benefit of interest in cash flows (not discount rate). 2. APV was introduced by academics and is slowly being adopted in practice. 3. 11% of firms always or almost always use it. • APV often requires/accomodates knowledge of a particular debt repayment schedule. • APV (as opposed to WACC) is suited for situations where the debt to equity ratio is changing significantly over time (capital intensive projects and LBOs). • APV can handle “side effects”: tax shield, issue costs, bankruptcy costs, etc. 3 Adjusted Present Value: Example • Suppose the firm is evaluating a project requiring a $10 million investment and offering an after-tax free cash flow of $1.8 million per year...

Words: 2208 - Pages: 9

Premium Essay

Comparative Analysis of Drl and Actavis

...Question 1 1. Differences in operations ACTAVIS | DRL | * Selling, General and Administrative expensesThe SGA expenses have risen as a percentage of the Net Revenues of Actavis in 2012 by 55%. The number of employees have gone up from 6686 to 17700 (refer Employees sub-topic in Page 22 of 2011 and 2012 10K reports) through these acquisitions and this has significantly contributed to the increase in the Administrative expenses of the organization. | * Selling, General and Administrative expensesThough SGA expense has significantly risen in 2012 when compared to the rise in 2011, the amount spent on selling, general and administrative activities has steadily reduced in proportion to the net revenue of the organization each year.This increase was primarily on account of the following: * increased personnel costs, due to annual raises and new recruitments; * higher distribution costs, due to increases in sales volumes and freight cost increases; and * impact of depreciation of the Indian rupee against multiple currencies in the markets in which we operate.(Refer Pg 72 in 2012 20F Application) | * Research and DevelopmentActavis has more than doubled its investment in R&D within the organization over the years since 2009 (Pg 5). From 2011 alone Actavis’s internal investment has risen by 36%. Close to 7% of the Net revenue is maintained as R&D expense every year. | * Research and DevelopmentResearch and development expenses increased by 17% during...

Words: 6159 - Pages: 25

Premium Essay

Hoosier Casting - Entrepreneur Finance

...Hoosier Castings Corporation | The Dynamics of Transitioning a Family Business | | TEAM 7 CLARK HAYS, NITHYA SUNDARAM & JADE CHEN TEAM 7 CLARK HAYS, NITHYA SUNDARAM & JADE CHEN 2/10/2014 2/10/2014 1. Burdens of Succession & Conflicts of Interest The major stakeholders for HCC are the DeWitt family members (David DeWitt 51%, Gregory DeWitt 15% and Mabel DeWitt 22%), Brendon Morris’s management team (Gregory DeWitt, Scott Rolston, Ryan Williams and Jennifer Nichols), the non-DeWitt family board members (Brendon Morris and Daniel Michaelson), as well as the HCC’s employees. Among them, only the three DeWitt family members, Michelson and Morris are the shareholders of HCC. HCC has a typical family ownership structure. The ownership and control is concentrated on the DeWitt family shareholders while currently David DeWitt serves as a chairman and consultant for the board, Gregory DeWitt is still on the top management team, and Mabel acts as an active participant in board meetings. According to Carl Magnus Bjuggren , Sven-Olov Daunfeldt and Dan Johansson’s “Highgrowth firms and family ownership” article, on the one hand, concentrated ownership gives the controlling shareholders incentives as well as ability to monitor the management. On the other hand, the combination of ownership and control means that families face opportunities to benefit themselves at the expense of other shareholders. History has also proven that this power concentration has helped...

Words: 3995 - Pages: 16

Premium Essay

Cash Management

...Cash management is defined as” processes and techniques focused on the acceleration of receivables and the cash conversion cycle. Reduction of the cash conversion cycle, along with the related investment of surplus funds, should be a critical objective of financial managers” (Cleverley, Song & Cleverley). Good cash management is the key to a successful business. Cash management is especially crucial in the health care industry for several reasons. Large sums of investment eligible funds pertain to hospitals and other healthcare firms. Hospitals and other healthcare firms experience larger investment management needs than other industries for the following reasons: * Many healthcare firms are voluntary, not-for-profit firms and must set aside funds for replacement of plants and equipment. * Healthcare firms are increasingly beginning to self-insure all or a portion of their professional liability risk. * Many healthcare firms receive gifts and endowments. Although these sums may not be large for individual firms, they can provide additional sources of investment. * Many healthcare firms also have sizable funding requirements for defined-benefit pension plans and debt service requirements associated with the issuance of bonds. (Cleverley, Song & Cleverley). Cash management is tied together with the cash conversion cycle. This cycle “represents the time it takes a firm to go from an...

Words: 1216 - Pages: 5

Premium Essay

Method of Optimization Cash Flow

... 1. FINANCIAL AND ECONOMIC ESSENCE OF CASH 4 1.1 Definition and classification of cash flows 4 2. OPTIMIZATION OF CASH FLOWS ON THE EXAMPLE OF THE COMPANY LLP “BASHLAK TRANS EXPRESS ALMATY” 16 2.1 General characteristic of activity 16 2.2 Cash flow analysis of LLP "BASHLAK TRANS EXPRESS ALMATY" 17 3. OPTIMIZATION OF THE SYSTEM IMPROVEMENT OF CASHFLOW AT THE ENTERPRISE 25 CONCLUSION 29 REFERENCES 30 INTRODUCTION In a modern economic situation one of the most important conditions of a survival and development of the enterprise is existence and rational use of monetary funds. In such circumstances, one of the key problems of the financial analysis is to define and maintain an optimal size and structure of the invested capital in a monetary form in order to obtain the maximum amount of cash flow over a certain period and the rational organization of settlements. In the conditions of the competition and unstable environment it is necessary to react quickly to deviations from normal activity of the enterprise. Cash flow management is the tool with which you can achieve the desired results of the enterprise - profit. These circumstances determined the choice of research topic. The...

Words: 11703 - Pages: 47

Premium Essay

Erwre

...flow from operations is cash collected from the sales of goods and services and from investments (e.g., interest and dividends), less cash spent for operating expenses. These include cash paid to suppliers, employees, interest, tax, and other miscellaneous operating expenses. The term operating cash flow is a net concept. Χ Cash flow from investing is cash spend on investments such as marketable securities, investments, PP&E, land, and patents, less cash received from the sales of these types of investments. The term investing cash flow is a net concept. In most cases, investing cash flow is negative. Χ Cash flow from financing is cash generated from the issuance of debt and the sale of stock, less cash spent for dividends, debt repayment, and the purchase of stock. Again, the term financing cash flow is a net concept. Χ In a sense, the objective of any business is to generate negative cash flows from financing, which represents the payback for equity and debt financiers. Any investment made in the company is done with the expectation that one day, the firm will be able to internally support substantial amounts of negative financing cash flows. Χ Non-cash transactions do not affect the cash flow statement. For example, if a firm acquires equipment through the issuance of a note payable, the increase in equipment does not represent an investing use of cash and the issuance of the note does not represent a financing source of cash. Χ The amount of gain or loss on...

Words: 3717 - Pages: 15

Premium Essay

Schedule Vi (Annexures).

...1.Abstract The balance sheet is necessary because it shows what the business has (assets) and what the business owes against those assets (liabilities). The difference between the assets and the liabilities shows the net worth of the business. The net worth of the business is important in that it is a measurement of the time the business is expected to stay in financial power. The balance sheet also provides the business with information on how best it is able to pay its debts. Underwriters also use the information in the balance sheet (working capital) to assess the business' ability to finance its operations. The balance sheet is necessary for the managers. It assists the managers of businesses in making decisions regarding purchasing of equipments for the business. Business managers depend on the balance sheet to analyze whether buying certain equipment on debt is the right move for the business at that time. Business managers need the balance sheet so as to decide the best source of credit for the business at that time. The balance sheet shows the accounting equation in a physical representation. The balance sheet also shows the owner's equity for example, it shows the value of the stock and the number of shares outstanding. The balance sheet is also used by the government agencies to make sure that the business is complying with the set laws. It also provides information to any potential lenders of the business on the credit worthiness of the business. When a group of...

Words: 10550 - Pages: 43

Premium Essay

Investment Banking

...Investment Banking Valuation, Leveraged Buyouts, and Mergers & Acquisitions JOSHUA ROSENBAUM JOSHUA PEARL FOREWORD BY JOSEPH R. PERELLA Investment Banking Founded in 1807, John Wiley & Sons is the oldest independent publishing company in the United States. With offices in North America, Europe, Australia, and Asia, Wiley is globally committed to developing and marketing print and electronic products and services for our customers’ professional and personal knowledge and understanding. The Wiley Finance series contains books written specifically for finance and investment professionals as well as sophisticated individual investors and their financial advisors. Book topics range from portfolio management to e-commerce, risk management, financial engineering, valuation, and financial instrument analysis, as well as much more. For a list of available titles, please visit our Web site at www.WileyFinance.com. Investment Banking Valuation, Leveraged Buyouts, and Mergers & Acquisitions JOSHUA ROSENBAUM JOSHUA PEARL John Wiley & Sons, Inc. Copyright C 2009 by Joshua Rosenbaum and Joshua Pearl. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976...

Words: 138300 - Pages: 554

Premium Essay

Idlc Report

...Internship Report on Functions oF credit risk management in non Banking Financial institutions (nBFi) in Bangladesh A study on IDLC Finance Limited Internship Report on Functions oF credit risk management in non Banking Financial institutions (nBFi) in Bangladesh A study on IDLC Finance Limited Submitted to: Sharmin Shabnam Rahman Dewan Mostafizur Rahman Internship supervisor of the submitter BRAC Business School (BBS) BRAC University Submitted By: Chowdhury Tasmiah Jabeen ID-06104024 BRAC Business School (BBS) BRAC University Date of Submission: 23rd December 2009 Letter of Transmittal_______________________ 23rd December 2009 Sharmin Shabnam Rahman BRAC Business School (BBS) BRAC University Subject: Submission of Internship Report of BBA Programme Dear Madam, It is my great pleasure to submit the internship report on "Functions of Credit Risk management in Non Banking Financial Institutions (NBFI) in Bangladesh, A study on IDLC Finance Ltd " which is a part of BBA Programme to you for your consideration. I made sincere efforts to study related materials, documents, observe operations performed in IDLC Finance Limited and examine relevant records for preparation of the report. Within the time limit, I have tried my best to compile the pertinent information as comprehensively as possible and if you need any further information, I will be glad to assist you. Thanking you, Chowdhury Tasmiah Jabeen ID-06104024 BRAC Business School (BBS) BRAC...

Words: 14614 - Pages: 59

Premium Essay

Bank Profile

...principal financial institution for coordinating the working of institutions engaged in financing export and import of goods and services with a view to promoting the country’s international trade. It has a high-powered Board of Directors comprising: A Deputy Governor of Reserve Bank of Bangladesh, Chairmen of IDBI, ECGC, Representatives of the Ministries of Finance, Commerce, Industry, External Affairs and Planning, Chairmen of scheduled banks and professionals from trade and industry. Over the years, Southeast Bank has developed 35 lending  programmes covering all stages of the export cycle namely Import of Technology, Export Product Development, Export Production, Export Marketing , Pre-shipment, Post-shipment, Investment Abroad Financial Highlights | |2000-01 |2001-02 |2002-03 |2003-04 |2004-05 | |Paid up Capital |549.99 |649.99 |649.99 |649.99 |849.99 | |Reserves |1,066.38 |1,202.64 |1,317.09 |1,493.30 |1,662.50 | |Net Profit |154.14 |171.16 |206.60 |229.23 |257.91 | |Dividend |38.00 |42.00 |45.00 |47.00 |65.44 | |Loan Outstanding...

Words: 5291 - Pages: 22

Premium Essay

Management of Working Capital Case Study

...Management of Working Capital Case Study: George’s Trains BUS650: Managerial Finance Stanley Atkinson Khrista Richards May 4, 2015 In this assignment I will be looking at the business that George started. He is coming to us for financial advice on his working capital practices. I will describe his working capital practices, including his methods of capital budgeting analysis techniques. Also I will analyze the potential pitfalls in his capital budgeting practices that George should be aware of. Then I will develop a simple statement of cash flows for George’s Trains using any information gleaned from the video. I will also look at what areas of improvement that I recommend. George started a model trains business with his sons. It started off as a hobby for him and grew from there into a business that does minor repairs for customers and hobby shops. George had no capital to invest in the business since he has worked for another company for so long. He only had a good relationship with his bank and was able to purchase the business from someone else and buy additional inventory. The bank found that they needed to make a capital investment in George’s Trains. The building for the shop was owned by someone who wanted to terminate the lease but George was able to buy the building for himself. He did not want to lose his customers that he had acquired while at this shop. To get this loan from the bank, George needed to make sure he was watching his spending in order to maintain...

Words: 971 - Pages: 4