Firewall and Security

Run this process everytime you want to give a basic structure for a "Firewall & Security" Subject to employees

8 steps

Process steps

1

Set up system and security settings

5 days from previous step
task
*insert template* Steps:From the Start menu, click Control Panel, then click System and Security Under Windows Firewall, select either Check firewall status to determine whether the firewall is turned on or off, or Allow a program through Windows Firewall to allow a blocked program through the firewall
2

Select program features

5 days from previous step
task
*insert template* Click Turn Windows Firewall on or off from the left side menu Configure the settings for your home/work (private) or public network Click OK to save your changes
3

Choose firewall settings for different network location types

5 days from previous step
task
*insert template* Steps:Turn on Windows Firewall for each network location you use - Home or work (private) or Public >Click What are network locations? for more information on network types> Domain network locations are controlled by your network administrator and can't be selected or changed Select Turn on Windows Firewall under the applicable network location type (in image below, both locations are selected) Select Notify me when Windows Firewall blocks a new program for each network type, if the box is not already checked Click OK to save your changes
4

Document current security posture

1 day from previous step
task
Before making any changes, know what you have. Map out existing firewall rules, security policies, and network architecture. Identify what ports are open, what traffic is allowed, and what is blocked. You cannot improve what you have not documented. Export current configs as a backup.
5

Define access requirements

1 day from previous step
task
What needs to connect to what? List out legitimate business traffic - applications, users, external services. Be specific about source and destination. The default stance should be deny everything, then explicitly allow what is needed. Document why each rule exists so future you knows the reasoning.
6

Configure firewall rules

1 day from previous step
task
Implement the rules based on your documented requirements. Start with the most restrictive settings and open only what is necessary. Put rules in the right order - firewalls process top to bottom, and order matters. Test each rule after implementing to verify it works as expected without breaking anything.
7

Enable logging and monitoring

1 day from previous step
task
Turn on detailed logging for all traffic - allowed and denied. Set up alerts for suspicious patterns like repeated failed connections or traffic spikes. Logs are useless if nobody looks at them, so establish a review cadence. Keep logs long enough to investigate incidents - at least 90 days minimum.
8

Schedule regular reviews

1 day from previous step
task
Security is not set and forget. Schedule quarterly reviews of firewall rules to remove stale entries and add new requirements. Test your configuration against known attacks. Update firmware and patches regularly. Document all changes with timestamps and justifications. Clean up rules that no longer have a valid business purpose.

Ready to use this template?

Sign up free and start running this process in minutes.

Discover Tallyfy