I was trying to disable network discovery on certain profiles both in Vista and 7. I would like my private networks to have network discovery on and my public networks to have this feature disabled.
The problem is that I noticed that whenever you want network discovery disabled you need to run windows firewall. If windows firewall is disabled, network discovery just gets enabled automatically.
Now I know that running two firewalls is not recommended but I was wondering if anyone could answer these three questions:
Will CIS have issues with windows firewall?
Should windows firewall be enabled whilst using CIS?
Is there any method to disable network discovery for specific networks only, using CIS?
Quite likely though some members have said they do not have any.
No though that is only my idea on this.
I doubt it only windows firewall has access to network settings in the information page you can disable bios and file sharing in the Adaptor but this will not be shown in the information page.
Probably, but you won't gain any security from it, just wasted computer resources
and for question 2, I recommend "no
3. Is there any method to disable network discovery for specific networks only, using CIS?
and I would like my private networks to have network discovery on and my public networks to have this feature disabled.
At least for windows 7, not quite sure under vista
1) Control Panel\Network and Internet\Network and Sharing Center\Advanced sharing settings
2) Under "Home or Work" AND Public, click on the arrow point down
3) change the settings from there
P.S. I would do only 1 or 2 setting at a time, If everythings fine, then continue from there
none - but i am using win xp. I use windows firewall for inbound and cis for outbound.
it can be, but only if you NO Global Rules to handle incoming traffic. If you do then its like 2 walls in your yard/house. Its ok but essentially useless. The way is to use xp firewall to filter inbound and use cis for outbound, i.e. whenever an app makes an outbound cis catches it and when it listens i.e. inbound both xp and cis catch it and you need to set rules for both of them.
taking the analogy further, cis’s wall is closer to your own door while xp’s wall is closer to the outside. so for inbound you need rules for both but for outbound only for cis.
Yes this method does work but if you check the advanced firewall settings from administrative tools you will notice that a part of the windows firewall is in fact on in order for those settings to work.