Skip to content
Windows Firewall

Windows Firewall

Published by Iru, Inc.

Configure Windows Firewall rules and policies to control inbound and outbound network traffic on Windows devices. Define port exceptions, application-specific rules, and network profile behaviors for domain, private, and public networks. Deploy this profile to enforce consistent security policies across endpoints, restrict unauthorized network access, allow specific applications or services through the firewall, and ensure compliance with organizational security requirements while maintaining necessary connectivity for business operations.

OS requirements
Windows
Related items:
BitLocker
BitLocker

Configure BitLocker drive encryption on Windows devices to protect data at rest through full-disk encryption using AES 128-bit or 256-bit algorithms. Manage encryption methods, authentication requirements (TPM, PIN, startup key), recovery key storage, and enforcement policies for operating system drives, fixed data drives, and removable drives. Deploy this profile to ensure compliance with data protection regulations, safeguard sensitive information on lost or stolen devices, and enforce consistent encryption standards across your Windows devices while maintaining centralized recovery key management.

Firewall
Firewall

Configure firewall rules and network security policies for Mac devices to control inbound and outbound network traffic. Define application-specific firewall rules, enable stealth mode to prevent network discovery, block all incoming connections, or allow signed applications automatically. Deploy this profile to enforce consistent network security policies across managed devices, protect endpoints from unauthorized access, and ensure compliance with organizational security requirements. Essential for securing devices in enterprise, education, and remote work environments.

Microsoft Defender
Microsoft Defender

The Microsoft Defender profile enables centralized configuration and enforcement of security settings for Microsoft Defender on Windows endpoints. Administrators can define policies for real-time threat protection, firewall rules, ransomware protection, controlled folder access, and attack surface reduction. The profile ensures continuous enforcement of security configurations, automatically remediating any drift to maintain compliance with organizational standards. By managing Defender settings through Iru's unified platform, organizations strengthen their security posture using native Windows protection capabilities while maintaining centralized visibility and control across their Windows device fleet.