Laboratory Activity 2
Laboratory Activity 2
Laboratory Activity 2
BSIT 3 BLOCK 1
• Maintain software updates: It's critical to maintain software updates so that security
vulnerabilities may be fixed. This covers everything from network hardware to security
systems, in addition to operating systems and applications.
• Monitoring network traffic may assist in spotting any unusual behavior, such as illegal
logins or data transfers, and enabling quick remediation before it results in a security
breach.
Organizations may help safeguard their networks and sensitive data from cyber attacks by adhering
to these and other security best practices.
b. What does the Windows Firewall with advanced security monitor?
On a Windows machine, the sophisticated security Windows Firewall keeps track of all
incoming and outgoing network traffic. By filtering network traffic according to pre-established
criteria, it adds an extra layer of security against illegal access to or from the computer.
You may define and manage inbound and outgoing traffic rules for individual applications,
services, and ports using the Windows Firewall's sophisticated security capabilities. On the basis
of the source or destination IP address, protocol, or port, you may also construct your own rules to
allow or prohibit particular types of communication.
The Windows Firewall may keep an eye on a variety of activities, including:
• Traffic entering and exiting from various network interfaces
• Traffic from particular services or apps
• Based on certain parameters like an IP address, a port number, or a protocol type, traffic
• Security incidents connected to firewall behavior, such lost packets, established
connections, or traffic blocks.
Overall, the Windows Firewall with enhanced security adds a crucial layer of security to Windows
machines by keeping an eye on and managing network traffic to help stop data loss and unwanted
access.
PICTURES:
Ernesto E. Dela Cruz Jr. BSIT 3 BLOCK 1