Lockdown Lab #17 CRITICAL Windows Server

Enable Windows Firewall on all profiles

Enable Windows Firewall on all profiles

How many times have I seen “unauthorized access” turn out to be a lack of basic perimeter control? Far too many. If your Windows Servers aren’t running their built-in firewall, you’re not just leaving a door open; you’re removing the door frame entirely.

This isn’t just about blocking external threats. It’s about containing lateral movement once an attacker is inside. Domain, Private, Public profiles – each needs to be active. I’ve seen environments where the Public profile was enabled, but Domain was left off because “it’s an internal network.” That’s a critical oversight.

You need to ensure all profiles are enabled. This is fundamental network segmentation at the host level. It’s basic, but it’s still missed in far too many organizations I audit.

Here’s the command to get it done:

Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled True Get-NetFirewallProfile | Select Name, Enabled

Don’t assume. Verify. Enable the firewall on every profile.

The fix

# PowerShell

Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled True

# Verify

Get-NetFirewallProfile | Select Name, Enabled

Reference: CIS Windows Server Benchmark 9.1

Mark this as done

Open the interactive hardening checklist and tick this off in your environment.

Open interactive checklist →

Related Posts

Require NTLMv2 and refuse LM/NTLMv1

Stop handing attackers your credentials on a silver platter. I've seen far too many environments where a simple NTLM relay or brute-force attack on weak...

lockdown-labhardeningwindowsidentity
/Shimi Cohen

Enforce account lockout policy

Brute-force attacks against user accounts are not sophisticated, but they are incredibly effective. If your Windows Servers aren't locking accounts, you're essentially providing an infinite...

lockdown-labhardeningwindowsidentity
/Shimi Cohen

Rename and disable built-in Administrator

If you’re still running default Administrator accounts on your Windows Servers, you’re practically handing attackers a key. This isn't theoretical; tools like Mimikatz and CrackMapExec...

lockdown-labhardeningwindowsidentity
/Shimi Cohen