IT security workflow for Tallyfy

Configure and maintain firewall security properly

Firewall rules accumulate over time, creating security gaps and undocumented access. Without regular reviews, you end up with stale rules nobody understands. This workflow establishes proper security configuration and ongoing maintenance schedules.

8 steps

Run this workflow in Tallyfy

1
Import this template into Tallyfy and assign your security team to document current posture before making any configuration changes
2
Use Tallyfy's task instructions to guide staff through defining access requirements, configuring rules in proper order, and enabling logging with 90-day retention
3
Schedule quarterly rule reviews in Tallyfy to remove stale entries, test configurations against known attacks, and document all changes with timestamps and justifications
Import this template into Tallyfy

Process steps

1

Check your current firewall status

5 days from previous step
task
Before you change anything, find out where you stand. Open your firewall management console (whether it's Windows Firewall, pfSense, Fortinet, or whatever you're running) and check if it's actually turned on. You'd be surprised how often we've found firewalls that were "configured" but not actually active. Verify it's running on all network interfaces, not just the one someone remembered to set up. If you're on Windows, go to Control Panel > System and Security > Windows Firewall to see the current state.
2

Turn on firewall protection for all network types

5 days from previous step
task
Here's what trips people up - your firewall likely has separate settings for different network types (private, public, domain). You need protection on ALL of them, not just one.

  1. Open your firewall settings and enable protection for every network profile - private (home/work), public (coffee shops, airports), and domain (if you're on a corporate network)
  2. Don't skip the public profile - that's actually where you're most at risk
  3. Turn on notifications so you'll know when the firewall blocks something new
  4. Save your changes and verify they stuck (sometimes group policy can override what you just did)
3

Set rules based on network location

5 days from previous step
task
Different networks need different rules - and getting this wrong is one of the most common mistakes we see. Your office network can be more permissive because you control it. Public Wi-Fi? Lock it down tight.

  1. For your private/office network - allow internal services your team actually uses (file shares, printers, internal apps). Block everything else.
  2. For public networks - block all incoming connections by default. There's almost never a good reason to accept inbound traffic on public Wi-Fi.
  3. For domain networks - work with your IT admin since these settings are usually managed centrally. Don't fight the group policy.
  4. Test that your settings actually work by trying to access resources from each network type.
4

Document what you've got right now

1 day from previous step
task
You can't fix what you don't understand. Before touching any rules, take a snapshot of your current setup. In our experience, most teams skip this step and regret it later when they can't roll back a change that broke something.

  1. Export your current firewall configuration to a file - this is your safety net if things go sideways
  2. List every open port and what it's there for. If you can't explain why a port is open, that's a red flag.
  3. Map out which traffic flows are allowed between your network segments
  4. Note any rules that look outdated or that nobody can explain - these are your first candidates for cleanup
  5. Save this documentation somewhere your team can actually find it (not buried in someone's email)
5

Figure out what actually needs access

1 day from previous step
task
This is where most firewall setups go wrong. Teams open ports "just in case" instead of figuring out what's truly needed. Start with everything blocked and only open what you can justify.

  1. Talk to each department about what external services they use daily - cloud apps, APIs, remote desktops, VPNs
  2. For each access request, write down the source, destination, port, and why it's needed. If someone says "I don't know, it's always been open" - that's not a good enough reason.
  3. Group similar access needs together so you don't end up with 500 individual rules when 20 would do
  4. Get sign-off from the person responsible for each service. When something breaks later, you'll want to know who to call.
6

Write and test your firewall rules

1 day from previous step
task
Now you're ready to build the actual rules. Don't rush this - a bad rule can either lock everyone out or leave you wide open. We've seen both happen, and neither is fun.

  1. Start with the most restrictive baseline - deny all inbound, allow only established outbound. Then add exceptions one at a time.
  2. Rule order matters. Firewalls read top to bottom and stop at the first match. Put your most specific rules near the top and your broad "deny all" at the bottom.
  3. Test each rule right after you add it. Don't batch 20 rules and then wonder which one broke email.
  4. Use descriptive names for every rule (not "Rule 47" - nobody'll remember what that does in six months)
  5. Keep a change log. When you're troubleshooting at 2 AM, you'll thank yourself for writing down what changed and when.
7

Set up logging so you'll actually know what's happening

1 day from previous step
task
A firewall without logging is like a security camera that's not recording. You won't know something went wrong until it's too late. We've worked with teams who had great firewall rules but couldn't investigate a breach because they never turned on logs.

  1. Enable logging for both allowed AND denied traffic. Denied-only logging misses the story of what did get through.
  2. Set up alerts for patterns that smell wrong - repeated connection attempts from the same IP, unusual traffic spikes at 3 AM, connections to known-bad destinations
  3. Decide who's actually going to review the logs and how often. Logs that nobody reads aren't protecting anyone.
  4. Keep your logs for at least 90 days. When you're investigating an incident, you'll often need to look back weeks or months to find the first signs.
  5. Make sure your log storage won't fill up and silently stop recording - set up disk space alerts too
8

Schedule ongoing reviews (don't skip this)

1 day from previous step
task
Firewall rules aren't something you set once and forget about. Your network changes, people leave, new services get added. If you don't review regularly, you'll end up with rules for servers that were decommissioned two years ago and gaps where new services were never properly covered.

  1. Put a quarterly review on the calendar - and actually do it. Every rule should still have a valid reason to exist.
  2. After each review, remove rules that don't have an owner or a clear business purpose. Every unnecessary rule is extra attack surface.
  3. Test your firewall against known attack patterns at least twice a year. There are free tools that'll do this for you.
  4. Keep firmware and software patches current. An outdated firewall with perfect rules can still be compromised through known vulnerabilities.
  5. Document every change with who made it, when, and why. Your future self (or your replacement) will appreciate it.

Ready to use this template?

Sign up free and start running this process in minutes.