(0) exportieren Drucken
Alle erweitern

Stealth Mode in Windows Firewall with Advanced Security

Letzte Aktualisierung: Januar 2009

Betrifft: Windows Server 2008

Stealth mode is a mechanism in Windows Firewall that helps prevent malicious users from discovering information about network computers and the services that they run.

It is common for an attacker to use an automated scanning process to send query packets to a range of IP addresses. For each IP address, the scanning process sends packets to a range of port numbers, and the response packets are used to identify the services that are installed on the computer. For example, if a computer responds to a UDP query with an ICMP unreachable packet, or to a TCP query with a reset message, then an attacker is able to determine the existence of a computer at that IP address and an open port in Windows Firewall that can be used to reach the computer. The attacker can then use this information to attempt to exploit vulnerabilities.

Stealth mode in Windows-Firewall mit erweiterten Sicherheitseinstellungen is designed to help protect against this kind of attack. Stealth mode blocks outgoing ICMP unreachable and TCP reset messages for a port when no application is listening on that port.

Stealth mode is enabled by default on computers that are running Windows Vista®, Windows Server® 2008, Windows® 7, and Windows Server® 2008 R2.

ImportantWichtig
Network packets dropped by the stealth mode feature are not logged.

Fanden Sie dies hilfreich?
(1500 verbleibende Zeichen)
Vielen Dank für Ihr Feedback.

Community-Beiträge

HINZUFÜGEN
Anzeigen:
© 2014 Microsoft