9.1.3 Ensure 'Windows Firewall: Domain: Outbound connections' is set to 'Allow (default)'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

This setting determines the behavior for outbound connections that do not match an outbound firewall rule.

The recommended state for this setting is: Allow (default).

Rationale:

Some people believe that it is prudent to block all outbound connections except those specifically approved by the user or administrator. Microsoft disagrees with this opinion, blocking outbound connections by default will force users to deal with a large number of dialog boxes prompting them to authorize or block applications such as their web browser or instant messaging software. Additionally, blocking outbound traffic has little value because if an attacker has compromised the system they can reconfigure the firewall anyway.

Impact:

None - this is the default behavior.

Solution

To establish the recommended configuration via GP, set the following UI path to Allow (default):

Computer Configuration\Policies\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Domain Profile\Outbound connections

Default Value:

Allow (default). (The Windows Firewall with Advanced Security will allow all outbound connections in this profile unless there is a firewall rule explicitly blocking it.)

Additional Information:

Windows Firewall with Advanced Security Technical Implementation Guide:
Version 1, Release 7, Benchmark Date: April 27, 2018

Vul ID: V-17419
Rule ID: SV-54863r3_rule
STIG ID: WNFWA-000005
Severity: CAT II

See Also

https://workbench.cisecurity.org/files/3345