“Fix Tech Daily helps you solve real-world IT problems, with daily tips on Windows, Office, networks, and devices.”
Wednesday, August 6, 2025
Set Up Network Security and Segmentation Window servers
Absolutely! Below is a complete step-by-step guide for:
✅ 2. Set Up Network Security and Segmentation
(Including methods for GUI, PowerShell, and basic automation)
Covers:
-
🔒 Firewall Rules
-
👤 Least Privilege Access
-
🔐 Multi-Factor Authentication (MFA)
-
📊 Logging & Monitoring
🔹 Part 1: Configure Windows Firewall Rules (to Isolate Clients)
✅ Method A: Using Windows Defender Firewall with GUI
-
Go to Start > Windows Defender Firewall with Advanced Security
-
Click Inbound Rules > New Rule
-
Choose Custom, then:
-
Program: All Programs
-
Protocol & Ports: Specify (e.g., TCP, port 3389 for RDP)
-
Scope: Define Local IP & Remote IP ranges (e.g., client subnets)
-
Action: Allow or Block
-
Profile: All (or choose Domain/Private)
-
Name:
Client1_RDP_Block
or something descriptive
-
-
Click Finish
-
Repeat for Outbound Rules if needed.
🔁 Create different rules for each client IP subnet.
✅ Method B: PowerShell (Advanced)
powershell# Example: Block RDP (port 3389) for a specific subnet New-NetFirewallRule -DisplayName "Block RDP for Client2" ` -Direction Inbound -Protocol TCP -LocalPort 3389 ` -RemoteAddress 192.168.20.0/24 -Action Block
You can adjust -Action Allow
to permit traffic and define -RemoteAddress
per client.
✅ Method C: Using Group Policy
-
Open Group Policy Management
-
Right-click the target OU > Create a GPO (e.g., "Client1 Firewall Rules")
-
Edit GPO > Go to:
Computer Configuration > Policies > Windows Settings > Security Settings > Windows Firewall with Advanced Security
-
Define Inbound/Outbound rules same as in GUI
-
Link GPO to the client’s OU
🔹 Part 2: Enforce Least Privilege Access
✅ Method A: Group Membership
-
In Active Directory Users and Computers, create security groups per role:
-
Client1-Admins
,Client1-Users
, etc.
-
-
Add users to the least privileged group only
-
Apply file/folder/share/permission settings using those groups
✅ Method B: Group Policy Restriction
Use GPO to restrict tools and settings:
-
Open GPO Editor
-
Navigate to:
User Configuration > Policies > Administrative Templates > Control Panel
-
Disable unwanted settings (e.g., Network Settings, Devices)
-
Use:
-
User Rights Assignment
to limit administrative privileges -
Security Options
to deny access to Control Panel or CMD
-
🔐 Part 3: Enable Multi-Factor Authentication (MFA)
✅ Option A: Microsoft Entra (Azure AD MFA)
💡 Requires hybrid environment or Microsoft 365 plan.
-
Sync on-prem AD with Azure AD using Azure AD Connect
-
Assign licenses that include MFA
-
Enable MFA via:
Microsoft Entra Admin Center > Security > MFA > Account Settings -
Users will be prompted to set up MFA during login
✅ Option B: Third-Party MFA for RDP (e.g., Duo Security)
-
Create an account on Duo.com
-
Download the Duo Windows Logon Installer
-
Install on your Server 2022:
-
During install, enter integration key, secret key, and API hostname
-
-
Duo will now prompt for MFA during RDP login
You can assign different policies per client by user group.
📊 Part 4: Set Up Logging, Monitoring, and Auditing
✅ Method A: Enable Auditing via Group Policy
-
Open GPO Editor
-
Navigate to:
Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration
-
Enable:
-
Logon Events
-
Object Access
-
Policy Change
-
Account Management
-
-
Apply GPO to the domain or specific client OUs
✅ Method B: View Logs
-
Open Event Viewer
-
Navigate to:
-
Windows Logs > Security
-
Applications and Services Logs > Microsoft > Windows > Security-Auditing
-
Use custom views to filter per event ID or user group.
✅ Method C: Install Monitoring Tools (Optional)
-
💼 Wazuh – open-source SIEM (agent-based)
-
🧩 Graylog, Splunk, or Sysmon – for deeper log analysis
-
🛠 Windows Admin Center – enables basic log view + notifications
📌 Summary of Tools Used
Task | Method | Tool Used |
---|---|---|
Firewall Segmentation | GUI, PowerShell, GPO | wf.msc , New-NetFirewallRule , GPO |
Least Privilege | AD Groups + GPO | dsa.msc , gpmc.msc |
MFA | Azure AD, Duo, or other | Azure Portal or Duo Installer |
Auditing | GPO + Event Viewer | Eventvwr , gpmc.msc |