Windows client firewall and port settings - Configuration Manager (2024)

  • Article

Applies to: Configuration Manager (current branch)

Client computers in Configuration Manager that run Windows Firewall often require you to configure exceptions to allow communication with their site. The exceptions that you must configure depend on the management features that you use with the Configuration Manager client.

Use the following sections to identify these management features and for more information about how to configure Windows Firewall for these exceptions.

Modifying the Ports and Programs Permitted by Windows Firewall

Use the following procedure to modify the ports and programs on Windows Firewall for the Configuration Manager client.

To modify the ports and programs permitted by Windows Firewall

  1. On the computer that runs Windows Firewall, open Control Panel.

  2. Right-click Windows Firewall, and then click Open.

  3. Configure any required exceptions and any custom programs and ports that you require.

Programs and Ports that Configuration Manager Requires

The following Configuration Manager features require exceptions on the Windows Firewall:

Queries

If you run the Configuration Manager console on a computer that runs Windows Firewall, queries fail the first time that they are run and the operating system displays a dialog box asking if you want to unblock statview.exe. If you unblock statview.exe, future queries will run without errors. You can also manually add Statview.exe to the list of programs and services on the Exceptions tab of the Windows Firewall before you run a query.

Client Push Installation

To use client push to install the Configuration Manager client, add the following as exceptions to the Windows Firewall:

  • Outbound and inbound: File and Printer Sharing

  • Inbound: Windows Management Instrumentation (WMI)

Client Installation by Using Group Policy

To use Group Policy to install the Configuration Manager client, add File and Printer Sharing as an exception to the Windows Firewall.

Client Requests

For client computers to communicate with Configuration Manager site systems, add the following as exceptions to the Windows Firewall:

Outbound: TCP Port 80 (for HTTP communication)

Outbound: TCP Port 443 (for HTTPS communication)

Important

These are default port numbers that can be changed in Configuration Manager. For more information, see How to How to configure client communication ports. If these ports have been changed from the default values, you must also configure matching exceptions on the Windows Firewall.

Client Notification

For the management point to notify client computers about an action that it must take when an administrative user selects a client action in the Configuration Manager console, such as download computer policy or initiate a malware scan, add the following as an exception to the Windows Firewall:

Outbound: TCP Port 10123

If this communication does not succeed, Configuration Manager automatically falls back to using the existing client-to-management point communication port of HTTP, or HTTPS:

Outbound: TCP Port 80 (for HTTP communication)

Outbound: TCP Port 443 (for HTTPS communication)

Important

These are default port numbers that can be changed in Configuration Manager. For more information, see How to configure client communication ports. If these ports have been changed from the default values, you must also configure matching exceptions on the Windows Firewall.

Remote Control

To use Configuration Manager remote control, allow the following port:

  • Inbound: TCP Port 2701

Remote Assistance and Remote Desktop

To initiate Remote Assistance from the Configuration Manager console, add the custom program Helpsvc.exe and the inbound custom port TCP 135 to the list of permitted programs and services in Windows Firewall on the client computer. You must also permit Remote Assistance and Remote Desktop. If you initiate Remote Assistance from the client computer, Windows Firewall automatically configures and permits Remote Assistance and Remote Desktop.

Wake-Up Proxy

If you enable the wake-up proxy client setting, a new service named ConfigMgr Wake-up Proxy uses a peer-to-peer protocol to check whether other computers are awake on the subnet and to wake them up if necessary. This communication uses the following ports:

Outbound: UDP Port 25536

Outbound: UDP Port 9

These are the default port numbers that can be changed in Configuration Manager by using the Power Management clients settings of Wake-up proxy port number (UDP) and Wake On LAN port number (UDP). If you specify the Power Management: Windows Firewall exception for wake-up proxy client setting, these ports are automatically configured in Windows Firewall for clients. However, if clients run a different firewall, you must manually configure the exceptions for these port numbers.

In addition to these ports, wake-up proxy also uses Internet Control Message Protocol (ICMP) echo request messages from one client computer to another client computer. This communication is used to confirm whether the other client computer is awake on the network. ICMP is sometimes referred to as TCP/IP ping commands.

For more information about wake-up proxy, see Plan how to wake up clients.

Windows Event Viewer, Windows Performance Monitor, and Windows Diagnostics

To access Windows Event Viewer, Windows Performance Monitor, and Windows Diagnostics from the Configuration Manager console, enable File and Printer Sharing as an exception on the Windows Firewall.

Ports Used During Configuration Manager Client Deployment

The following tables list the ports that are used during the client installation process.

Important

If there is a firewall between the site system servers and the client computer, confirm whether the firewall permits traffic for the ports that are required for the client installation method that you choose. For example, firewalls often prevent client push installation from succeeding because they block Server Message Block (SMB) and Remote Procedure Calls (RPC). In this scenario, use a different client installation method, such as manual installation (running CCMSetup.exe) or Group Policy-based client installation. These alternative client installation methods do not require SMB or RPC.

For information about how to configure Windows Firewall on the client computer, see Modifying the Ports and Programs Permitted by Windows Firewall.

Ports that are used for all installation methods

DescriptionUDPTCP
Hypertext Transfer Protocol (HTTP) from the client computer to a fallback status point, when a fallback status point is assigned to the client.--80 (See note 1, Alternate Port Available)

Ports that are used with client push installation

DescriptionUDPTCP
Server Message Block (SMB) between the site server and client computer.--445
RPC endpoint mapper between the site server and the client computer.135135
RPC dynamic ports between the site server and the client computer.--DYNAMIC
Hypertext Transfer Protocol (HTTP) from the client computer to a management point when the connection is over HTTP.--80 (See note 1, Alternate Port Available)
Secure Hypertext Transfer Protocol (HTTPS) from the client computer to a management point when the connection is over HTTPS.--443 (See note 1, Alternate Port Available)

Ports that are used with software update point-based installation

DescriptionUDPTCP
Hypertext Transfer Protocol (HTTP) from the client computer to the software update point.--80 or 8530 (See note 2, Windows Server Update Services)
Secure Hypertext Transfer Protocol (HTTPS) from the client computer to the software update point.--443 or 8531 (See note 2, Windows Server Update Services)
Server Message Block (SMB) between the source server and the client computer when you specify the CCMSetup command-line property /source:<Path>.--445

Ports that are used with Group Policy-based installation

DescriptionUDPTCP
Hypertext Transfer Protocol (HTTP) from the client computer to a management point when the connection is over HTTP.--80 (See note 1, Alternate Port Available)
Secure Hypertext Transfer Protocol (HTTPS) from the client computer to a management point when the connection is over HTTPS.--443 (See note 1, Alternate Port Available)
Server Message Block (SMB) between the source server and the client computer when you specify the CCMSetup command-line property /source:<Path>.--445

Ports that are used with manual installation and logon script-based installation

DescriptionUDPTCP
Server Message Block (SMB) between the client computer and a network share from which you run CCMSetup.exe.

When you install Configuration Manager, the client installation source files are copied and automatically shared from the <InstallationPath>\Client folder on management points. However, you can copy these files and create a new share on any computer on the network. Alternatively, you can eliminate this network traffic by running CCMSetup.exe locally, for example, by using removable media.

--445
Hypertext Transfer Protocol (HTTP) from the client computer to a management point when the connection is over HTTP, and you do not specify the CCMSetup command-line property /source:<Path>.--80 (See note 1, Alternate Port Available)
Secure Hypertext Transfer Protocol (HTTPS) from the client computer to a management point when the connection is over HTTPS, and you do not specify the CCMSetup command-line property /source:<Path>.--443 (See note 1, Alternate Port Available)
Server Message Block (SMB) between the source server and the client computer when you specify the CCMSetup command-line property /source:<Path>.--445

Ports that are used with software distribution-based installation

DescriptionUDPTCP
Server Message Block (SMB) between the distribution point and the client computer.--445
Hypertext Transfer Protocol (HTTP) from the client to a distribution point when the connection is over HTTP.--80 (See note 1, Alternate Port Available)
Secure Hypertext Transfer Protocol (HTTPS) from the client to a distribution point when the connection is over HTTPS.--443 (See note 1, Alternate Port Available)

Notes

1 Alternate Port Available In Configuration Manager, you can define an alternate port for this value. If a custom port has been defined, substitute that custom port when you define the IP filter information for IPsec policies or for configuring firewalls.

2 Windows Server Update Services You can install Windows Server Update Service (WSUS) either on the default Web site (port 80) or a custom Web site (port 8530).

After installation, you can change the port. You do not have to use the same port number throughout the site hierarchy.

If the HTTP port is 80, the HTTPS port must be 443.

If the HTTP port is anything else, the HTTPS port must be 1 higher. For example, 8530 and 8531.

Windows client firewall and port settings - Configuration Manager (2024)

FAQs

What are the recommended settings for Windows Firewall? ›

Firewall rules recommendations
  • Maintain the default Windows Firewall settings whenever possible. ...
  • Create your rules in all three profiles, but only enable the firewall rule group on the profiles that suit your scenarios. ...
  • Configure restrictions on your firewall rules depending on which profile the rules are applied to.
Nov 21, 2023

How to see if Windows Firewall is blocking a port or program? ›

To see if your firewall is blocking a website, app, or port on Windows, go to Windows Firewall > Advanced Settings and check your Outbound rules. On a Mac, click the Apple icon > System Settings > Network > Firewall > Options to check your firewall settings.

What port does configuration manager use? ›

Ports you can configure

By default, the HTTP port that's used for client-to-site system communication is port 80, and 443 for HTTPS. You can change these ports during setup or in the site properties.

What is the purpose of configuring firewall in Windows operating system? ›

Firewall policy configuration is based on network type, such as public or private, and can be set up with security rules that block or allow access to prevent potential attacks from hackers or malware.

Which Windows setting must one configure to turn on firewall? ›

To turn on Windows Defender Firewall:
  • Go to Start and open Control Panel.
  • Select System and Security > Windows Defender Firewall.
  • Choose Turn Windows Defender Firewall on or off.
  • Select Turn on Windows Defender Firewall for domain, private, and public network settings.
Dec 1, 2023

Should firewall settings on or off? ›

Most new computers come with a built-in firewall, so there's no extra equipment or software to buy. Consult your computer's security settings to determine if you have a built-in firewall. If the option exists, turn on the firewall. Default settings are typically acceptable for most people.

What ports should be blocked on a firewall? ›

Common High-Risk Ports
PortProtocolRecommended Action
139TCP and UDPDisable always.
445TCP and UDPDisable always.
161TCP and UDPDisable always.
389TCP and UDPDisable always.
28 more rows
Apr 6, 2023

How can I test if a port is blocked? ›

Enter "telnet + IP address or hostname + port number" (e.g., telnet www.example.com 1723 or telnet 10.17.xxx.xxx 5000) to run the telnet command in Command Prompt and test the TCP port status. If the port is open, only a cursor will show. If the port is closed, a message will say Connect failed.

Does Windows Firewall block ports by default? ›

By default, Windows Firewall blocks all incoming traffic, thereby denying any connection requests aimed at your computer. However, there are instances where you may need to allow incoming traffic to a specific port, such as when hosting a server or playing online games.

What is Configuration Manager used for? ›

Configuration Manager helps you deliver more effective IT services by enabling: Secure and scalable deployment of applications, software updates, and operating systems. Real-time actions on managed devices. Cloud-powered analytics and management for on-premises and internet-based devices.

Where is Configuration Manager installed? ›

The Configuration Manager console is always installed on the site server for the CAS or a primary site. To install the console separate from site server installation, run the standalone installer.

What ports are used for what? ›

What are the different port numbers?
  • Ports 20 and 21: File Transfer Protocol (FTP). ...
  • Port 22: Secure Shell (SSH). ...
  • Port 25: Historically, Simple Mail Transfer Protocol (SMTP). ...
  • Port 53: Domain Name System (DNS). ...
  • Port 80: Hypertext Transfer Protocol (HTTP). ...
  • Port 123: Network Time Protocol (NTP).

How to configure Windows Firewall step by step? ›

Instructions
  1. Step 1: Access Windows Firewall. ...
  2. Step 2: Enable an inbound rule. ...
  3. Step 3: Create a new rule. ...
  4. Step 4: Define the type of rule to activate. ...
  5. Step 5: Define the port type to activate. ...
  6. Step 6: Allow or block the connection. ...
  7. Step 7: Define the firewall profile and name to apply.
Jan 31, 2022

Should Windows Firewall be enabled? ›

It's important to have Microsoft Defender Firewall on, even if you already have another firewall on. It helps protect you from unauthorized access. Select a network profile: Domain network, Private network, or Public network. Under Microsoft Defender Firewall, switch the setting to On.

What are the effects of incorrect configuration of firewall? ›

A single misconfigured rule can provide an unintended pathway for malicious actors to infiltrate your network. This can lead to devastating consequences, including data breaches, intellectual property theft, financial losses, and damage to your organization's reputation.

How to optimize Windows Firewall? ›

How to optimize Windows Firewall security
  1. Identify blocked applications. Windows machines notify by default when an application is blocked. ...
  2. Set up security monitoring. If you are using a security event log monitoring solution to monitor events, keep the following in mind:
  3. Block PowerShell from internet access.

Which firewall level is best? ›

Application-layer firewalls are best used to protect enterprise resources from web application threats. They can both block access to harmful sites and prevent sensitive information from being leaked from within the firewall.

How do I optimize my firewall rules? ›

In addition, take note of the following firewall optimization best practices.
  1. Limit the number of rules. ...
  2. Regularly review and update the rule-base. ...
  3. Enforce a “least privilege” principle. ...
  4. Segment networks to reduce the scope of rules. ...
  5. Test and validate rules before implementing changes.

What is the firewall standard configuration? ›

Firewall configuration involves configuring domain names and Internet Protocol (IP) addresses and completing several other actions to keep firewalls secure. Firewall policy configuration is based on network types called “profiles” that can be set up with security rules to prevent cyber attacks.

Top Articles
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 6090

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.