Prevent Windows Media DRM Internet Access

Prevents Windows Media Digital Rights Management (DRM) from accessing the Internet (or intranet). When enabled Windows Media DRM is prevented from accessing the Internet (or intranet) for license acquisition and security upgrades. When this policy is enabled programs are not able to acquire licenses for secure content upgrade Windows Media DRM security components or restore backed up content licenses. Secure content that is already licensed to the local computer will continue to play. Users are also able to protect music that they copy from a CD and play this protected content on their computer since the license is generated locally in this scenario. When this policy is either disabled or not configured Windows Media DRM functions normally and will connect to the Internet (or intranet) to acquire licenses download security upgrades and perform license restoration.

Prevent Automatic Updates

This policy setting allows you to turn off do not show first use dialog boxes. If you enable this policy setting the Privacy Options and Installation Options dialog boxes are prevented from being displayed the first time a user starts Windows Media Player. This policy setting prevents the dialog boxes which allow users to select privacy file types and other desktop options from being displayed when the Player is first started. Some of the options can be configured by using other Windows Media Player group policies. If you disable or do not configure this policy setting the dialog boxes are displayed when the user starts the Player for the first time.

Do Not Show First Use Dialog Boxes

This policy setting allows you to prevent the anchor window from being displayed when Windows Media Player is in skin mode. If you enable this policy setting the anchor window is hidden when the Player is in skin mode. In addition the option on the Player tab in the Player that enables users to choose whether the anchor window displays is not available. If you disable or do not configure this policy setting users can show or hide the anchor window when the Player is in skin mode by using the Player tab in the Player. If you do not configure this policy setting and the “Set and lock skin” policy setting is enabled some options in the anchor window are not available.

Windows Firewall: Allow logging

Allows Windows Firewall to record information about the unsolicited incoming messages that it receives. If you enable this policy setting Windows Firewall writes the information to a log file. You must provide the name location and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Firewall does not provide an option to log successful incoming messages. If you are configuring the log file name ensure that the Windows Firewall service account has write permissions to the folder containing the log file. Default path for the log file is %systemroot% -> system32 -> LogFiles -> Firewall -> pfirewall. log. If you disable this policy setting Windows Firewall does not record information in the log file. If you enable this policy setting and Windows Firewall creates the log file and adds information then upon disabling this policy setting Windows Firewall leaves the log file intact. If you do not configure this policy setting Windows Firewall behaves as if the policy setting were disabled.

Windows Firewall: Prohibit notifications

Prevents Windows Firewall from displaying notifications to the user when a program requests that Windows Firewall add the program to the program exceptions list. If you enable this policy setting Windows Firewall prevents the display of these notifications. If you disable this policy setting Windows Firewall allows the display of these notifications. In the Windows Firewall component of Control Panel the “Notify me when Windows Firewall blocks a new program” check box is selected and administrators cannot clear it. If you do not configure this policy setting Windows Firewall behaves as if the policy setting were disabled except that in the Windows Firewall component of Control Panel the “Notify me when Windows Firewall blocks a new program” check box is selected by default and administrators can change it.

Windows Firewall: Define inbound port exceptions

Allows you to view and change the inbound port exceptions list defined by Group Policy. Windows Firewall uses two port exception lists: one is defined by Group Policy settings and the other is defined by the Windows Firewall component in Control Panel. If you enable this policy setting you can view and change the inbound port exceptions list defined by Group Policy. To view this port exceptions list enable the policy setting and then click the Show button. To add a port enable the policy setting note the syntax click the Show button. In the Show Contents dialog box type a definition string that uses the syntax format. To remove a port click its definition and then press the DELETE key. To edit a definition remove the current definition from the list and add a new one with different parameters. To allow administrators to add ports to the local port exceptions list that is defined by the Windows Firewall component in Control Panel also enable the “Windows Firewall: Allow local port exceptions” policy setting. If you disable this policy setting the port exceptions list defined by Group Policy is deleted but other policy settings can continue to open or block ports. Also if a local port exceptions list exists it is ignored unless you enable the “Windows Firewall: Allow local port exceptions” policy setting. If you do not configure this policy setting Windows Firewall uses only the local port exceptions list that administrators define by using the Windows Firewall component in Control Panel. Other policy settings can continue to open or block ports. Note: If you type an invalid definition string Windows Firewall adds it to the list without checking for errors and therefore you can accidentally create multiple entries for the same port with conflicting Scope or Status values. Scope parameters are combined for multiple entries. If entries have different Status values any definition with the Status set to “disabled” overrides all definitions with the Status set to “enabled” and the port does not receive messages. Therefore if you set the Status of a port to “disabled” you can prevent administrators from using the Windows Firewall component in Control Panel to enable the port. Note: The only effect of setting the Status value to “disabled” is that Windows Firewall ignores other definitions for that port that set the Status to “enabled. ” If another policy setting opens a port or if a program in the program exceptions list asks Windows Firewall to open a port Windows Firewall opens the port. Note: If any policy setting opens TCP port 445 Windows Firewall allows inbound ICMP echo request messages (the message sent by the Ping utility) even if the “Windows Firewall: Allow ICMP exceptions” policy setting would block them. Policy settings that can open TCP port 445 include “Windows Firewall: Allow inbound file and printer sharing exception” “Windows Firewall: Allow inbound remote administration exception” and “Windows Firewall: Define inbound port exceptions. “

Windows Firewall: Allow local port exceptions

Allows administrators to use the Windows Firewall component in Control Panel to define a local port exceptions list. Windows Firewall uses two port exceptions lists; the other is defined by the “Windows Firewall: Define inbound port exceptions” policy setting. If you enable this policy setting the Windows Firewall component in Control Panel allows administrators to define a local port exceptions list. If you disable this policy setting the Windows Firewall component in Control Panel does not allow administrators to define a local port exceptions list. However local administrators will still be allowed to create firewall rules in the Windows Firewall with Advanced Security snap-in. If you wish to prevent all locally created rules from applying use the Group Policy Object Editor snap-in and configure Computer Configuration -> Windows Settings -> Security Settings -> Windows Firewall with Advanced Security to specify that local firewall rules should not apply.

Windows Firewall: Allow inbound remote administration exception

Allows remote administration of this computer using administrative tools such as the Microsoft Management Console (MMC) and Windows Management Instrumentation (WMI). To do this Windows Firewall opens TCP ports 135 and 445. Services typically use these ports to communicate using remote procedure calls (RPC) and Distributed Component Object Model (DCOM). Additionally on Windows XP Professional with at least SP2 and Windows Server 2003 with at least SP1 this policy setting also allows SVCHOST. EXE and LSASS. EXE to receive unsolicited incoming messages and allows hosted services to open additional dynamically-assigned ports typically in the range of 1024 to 1034. On Windows Vista this policy setting does not control connections to SVCHOST. EXE and LSASS. EXE. If you enable this policy setting Windows Firewall allows the computer to receive the unsolicited incoming messages associated with remote administration. You must specify the IP addresses or subnets from which these incoming messages are allowed. If you disable or do not configure this policy setting Windows Firewall does not open TCP port 135 or 445. Also on Windows XP Professional with at least SP2 and Windows Server 2003 with at least SP1 Windows Firewall prevents SVCHOST. EXE and LSASS. EXE from receiving unsolicited incoming messages and prevents hosted services from opening additional dynamically-assigned ports. Because disabling this policy setting does not block TCP port 445 it does not conflict with the “Windows Firewall: Allow file and printer sharing exception” policy setting. Note: Malicious users often attempt to attack networks and computers using RPC and DCOM. We recommend that you contact the manufacturers of your critical programs to determine if they are hosted by SVCHOST. exe or LSASS. exe or if they require RPC and DCOM communication. If they do not then do not enable this policy setting. Note: If any policy setting opens TCP port 445 Windows Firewall allows inbound ICMP echo request messages (the message sent by the Ping utility) even if the “Windows Firewall: Allow ICMP exceptions” policy setting would block them. Policy settings that can open TCP port 445 include “Windows Firewall: Allow inbound file and printer sharing exception” “Windows Firewall: Allow inbound remote administration exception” and “Windows Firewall: Define inbound port exceptions. “

Windows Firewall: Allow local program exceptions

Allows administrators to use the Windows Firewall component in Control Panel to define a local program exceptions list. Windows Firewall uses two program exceptions lists; the other is defined by the “Windows Firewall: Define inbound program exceptions” policy setting. If you enable this policy setting the Windows Firewall component in Control Panel allows administrators to define a local program exceptions list. If you disable this policy setting the Windows Firewall component in Control Panel does not allow administrators to define a local program exceptions list. However local administrators will still be allowed to create firewall rules in the Windows Firewall with Advanced Security snap-in. If you wish to prevent all locally created rules from applying use the Group Policy Object Editor snap-in and configure Computer Configuration -> Windows Settings -> Security Settings -> Windows Firewall with Advanced Security to specify that local firewall rules should not apply.

Windows Firewall: Protect all network connections

Turns on Windows Firewall. If you enable this policy setting Windows Firewall runs and ignores the “Computer Configuration -> Administrative Templates -> Network -> Network Connections -> Prohibit use of Internet Connection Firewall on your DNS domain network” policy setting. If you disable this policy setting Windows Firewall does not run. This is the only way to ensure that Windows Firewall does not run and administrators who log on locally cannot start it. If you do not configure this policy setting administrators can use the Windows Firewall component in Control Panel to turn Windows Firewall on or off unless the “Prohibit use of Internet Connection Firewall on your DNS domain network” policy setting overrides.