1.2.1.1.1.2.1 Configure 'Windows Firewall: Allow inbound UPnP framework exceptions'

Information

Microsoft recommends that you avoid the use of this setting, unless required by your environment and your organization's business requirements. This policy setting allows a computer to receive unsolicited Plug and Play messages that are sent by network devices, such as routers with built-in firewalls. To receive these messages, Windows Firewall opens TCP port 2869 and UDP port 1900. Blocking UPnP network traffic effectively reduces the attack surface of computers in your environment.

Solution

Configure the following Group Policy setting in a manner that is consistent with the security and operational requirements of your organization-

Computer Configuration\Administrative Templates\Network\Network Connections\Windows Firewall\Domain Profile\Windows Firewall- Allow inbound UPnP framework exceptions

Impact- If you enable the Windows Firewall- Allow inbound UPnP framework exceptions setting, Windows Firewall opens these ports so that the computer can receive Plug and Play messages. You must specify the IP addresses or subnets from which these inbound messages are allowed. If you disable this policy setting, Windows Firewall blocks these ports and prevents the computer from receiving Plug and Play messages.

See Also

https://workbench.cisecurity.org/files/42

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(11), CCE|CCE-16829-4

Plugin: Windows

Control ID: 7691542e34dd9b0d5824b5d67c02824368f1717ba6e0e4f4cac5328531ef1c43