In order to make the computer easy to use, we often download various applications from the Internet. However, in the Windows 2008 system, when some programs are running, our computer firewall will prompt us to “security with the target application”. We generally think that as long as the Windows Server 2008 system is updated in time, it will be fine. This is not the case. The Windows 2008 server system update patch can only block some security vulnerabilities in the system itself, but it does not work for obvious vulnerabilities in applications installed on Windows 2008 systems. In order to prevent application vulnerabilities from being exploited, we should take countermeasures to deal with them as follows:
1. Select Windows2008 "Start”——“Program”——&ldquo ;Administrative Tools”——“Server Manager”option, on the left side of the dialog box, select “Configure”,“Advanced Security Windows Firewall> branch option, click from the target branch ; inbound rules & rdquo; options. (As shown below)
2. Then we click on the “New Rule" option from the "Inbound Rules"> New Rules" option, the system screen will pop up automatically In the wizard window of the inbound rule, select the "Program" option, and click the "Next" button to pop up the settings window, select the "This program path" option in the settings window, and then in the In the following dialog box, enter the full path to the system of the application with the security vulnerability. Of course, we can also quickly find the location of the application by using the “Browse” button. (As shown below)
3. Next we should select the “Block Connection” option (as shown below)
4. Then click the “Next” button to set the current The scope of application of inbound rules, of course, the situation varies from person to person, but in order to ensure security, we will select the three options "Domain, Private, Public". Therefore, when the Windows 2008 system is connected to different networks, any illegal programs cannot exploit the vulnerability of the target application to attack the Windows 2008 system through the network. (As shown below)
5. After completing the above setting operation, we only need to set the name of the current new rule, and click the “Complete” button to save the above creation operation.
The above five simple steps can easily block the application vulnerabilities in the system. We can use the set program to protect our computer from Trojans through the normal use of the network. The program is attacked.
Many users found that their system has no sound after installing the win2008 system
When checking windows 2008 logs, in -safe - found that there are constantly message
Compared with the new operating system, win2008 does not have a gorgeous interface,
In order to protect personal data, most netizens will set a login password for their own computer. B
Create Windows 2008 to let multiple users share remote desktops
The magic of Windows 2008 system audit function
Microsoft official Windows 8.1 official version download entry came out
Xp system tips: Prevent changes to desktop settings
Easily back up system services and solve Win2008 optimization faults
Explore HPC clusters under Windows 2008
How does win2008 prohibit P2P tool download? Advanced firewall to help out
Easy to achieve Windows Server 2008 shared high-speed access cheats
It’s too much trouble! Please return it to win2008?
How to solve the old audit failure problem of win2008 system log
IE home page forced to connect to a website solution
Lenovo /DELL /Acer Windows7 Ultimate OEM serial number
How does Win7 use the Group Policy Editor to disable the command prompt?
Zombie Besieged City 1 hidden items how to get Zombie Besieged City 1 hidden items to get Raiders
What should I do if the Win8.1 installer stops responding
How does the entire interface of the Win10 system turn black?
How to adjust the Win7 resolution? Win7 method to adjust the resolution of the computer screen
Amazing tricks to teach you the use of laptop Bluetooth and how to open
How does the Win8.1 system use the right-click menu to shut down?