{"id":182,"date":"2013-04-01T18:26:36","date_gmt":"2013-04-01T18:26:36","guid":{"rendered":"http:\/\/technese.com\/?p=182"},"modified":"2014-09-07T00:24:36","modified_gmt":"2014-09-07T00:24:36","slug":"block-inbound-for-ports-135-445-1028-and-ping-icmp-8-for-windows-7-2008-server","status":"publish","type":"post","link":"https:\/\/technese.com\/index.php\/2013\/04\/01\/block-inbound-for-ports-135-445-1028-and-ping-icmp-8-for-windows-7-2008-server\/","title":{"rendered":"Block Inbound for Ports 135, 445, 1028 and Ping (ICMP 8) for Windows 7, 2008 Server"},"content":{"rendered":"<p>For workstations\/servers that are public Internet facing and do not have a\u00c2\u00a0 hardware\/software firewall solution, use Windows Firewall with Advanced Security and block port 135, 445, 1028 and PING (ICMP 8) .\u00c2\u00a0 GRC&#8217;s Shields Up! shows these ports as being open.<\/p>\n<p>Reference:<\/p>\n<p>https:\/\/www.grc.com\/x\/ne.dll?bh0bkyd2<br \/>\nhttp:\/\/www.rackspace.com\/knowledge_center\/article\/creating-an-inbound-port-deny-rule-for-windows-firewall-windows-2008<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For workstations\/servers that are public Internet facing and do not have a\u00c2\u00a0 hardware\/software firewall solution, use Windows Firewall with Advanced Security and block port 135, 445, 1028 and PING (ICMP 8) .\u00c2\u00a0 GRC&#8217;s Shields Up! shows these ports as being open. Reference: https:\/\/www.grc.com\/x\/ne.dll?bh0bkyd2 http:\/\/www.rackspace.com\/knowledge_center\/article\/creating-an-inbound-port-deny-rule-for-windows-firewall-windows-2008 &nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-182","post","type-post","status-publish","format-standard","hentry","category-general"],"_links":{"self":[{"href":"https:\/\/technese.com\/index.php\/wp-json\/wp\/v2\/posts\/182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technese.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technese.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technese.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/technese.com\/index.php\/wp-json\/wp\/v2\/comments?post=182"}],"version-history":[{"count":4,"href":"https:\/\/technese.com\/index.php\/wp-json\/wp\/v2\/posts\/182\/revisions"}],"predecessor-version":[{"id":225,"href":"https:\/\/technese.com\/index.php\/wp-json\/wp\/v2\/posts\/182\/revisions\/225"}],"wp:attachment":[{"href":"https:\/\/technese.com\/index.php\/wp-json\/wp\/v2\/media?parent=182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technese.com\/index.php\/wp-json\/wp\/v2\/categories?post=182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technese.com\/index.php\/wp-json\/wp\/v2\/tags?post=182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}