Restarting Windows Defender Firewall with Prompts / Permissions
Restarting Windows Defender Firewall with Prompts / Permissions
I completed the removal of the family Norton subscription from my Windows 10 Pro system (though I realize it’s late, as I wasn’t billed for it). Now I’m focusing on taking back network control using the Windows Security Suite. My aim is to remove all network permissions for applications, programs, and services, ensuring Windows Defender Firewall asks for permission each time a new app tries to connect (both outgoing and incoming). The issue is that simply marking apps as “allowed” doesn’t seem to stop access. There’s a notification box for blocked items, but it fails when Microsoft decides to let something through without consent. I also need to review past traffic in this way. I used a standard Windows Enterprise edition that lets me configure firewall settings and could build custom rules via the Control Panel or write a PowerShell script if needed. It seems there might have been an oversight or the feature was streamlined, but it should be more accessible through the GUI now. This is the only question I’ve had so far, and in the usual pattern of Microsoft’s “Independent Advisors,” they didn’t address it directly—they provided a generic response to a similar but different issue. https://answers.microsoft.com/en-us/wind...2e86943792 Any suggestions on the value of third-party standalone firewalls like GlassWire would be welcome. I’m just seeking a more user-friendly solution. Any assistance is greatly appreciated. Related complaints about Windows Security will be accepted for the extra effort and general benefit.
This topic isn't common; Windows doesn't permit unchecked apps or automatically let them through without permission. [*] If you wish to avoid pop-ups or disable the firewall temporarily, consider resetting Windows Defender and sticking to its default configuration. Unless you have a specific reason, I suggest using it as it’s the most user-friendly and least intrusive antivirus I know (though I’m about to pretend that hacking tools aren’t actually dangerous... >_)). I apologize, but I’m recommending Windows Defender since it’s straightforward and respects your control.
Spoiler [*] There are exceptions—some programs may need updates or similar actions—but the firewall usually doesn’t request consent in those cases. Still, Defender will monitor that activity regularly. Whether it poses a risk depends on how much you trust third-party software. It’s comparable to Linux, where you often have to trust “sudo” or not trust it at all.
P.S.: For clarity, the process is simple: https://www.tenforums.com/tutorials/7074...-10-a.html
I just performed a complete reset of my Windows security settings to start fresh. The aim is to get alerts whenever an app or service I haven’t personally approved tries to connect to the network. For instance, if I never saw a Windows Firewall alert about Google Chrome attempting internet access and clicking 'allow,' Chrome shouldn’t be able to operate as a web browser. A few basic checks with Firefox and Chrome showed that skipping entries in the 'Apps allowed' list doesn’t prevent them from browsing the web. It just changes Windows’ default blocking choice. Since I haven’t seen any firewall warnings after the reset, it only blocks incoming connections, not local ones. I realized installers can create their own firewall rules too. Still, resetting the firewall should remove those as well. I even wrote a script to quickly generate block rules for suspicious executables that didn’t need internet access and will need updating regularly. I’m leaning toward a clean Windows installation now.
Yes, that explains why I added the [*] warning—most programs request permission, but not all. Some, like Chrome or Edge, even ask for updates as if they’re asking for permission, while others just start downloading without warning. Once you click install, Windows usually tells it it’s safe, which can feel risky. Still, you could block such behavior with firewall rules. It’s probably normal for Windows and similar OSes to handle this kind of background activity, like the real AV software I have. That’s why a good antivirus is useful—it catches these kinds of things. By the way, Windows does the same thing too, constantly handling background tasks. You can stop "WaasMedic" if you want.
I followed more than 300 guidelines, with over 200 aimed at preventing official Microsoft files. That’s why I consistently rely on the "Pro" editions of Windows. Since 2016, I’ve locked Group Policy for Windows Update in the storage closet. He receives supervised outdoor time a few times each month. It also acts as a deterrent for the vampire of Windows 11.