This setting determines the behavior for inbound connections that do not match an inbound firewall rule. The default behavior is to block connections unless there are firewall rules to allow the connection. Vulnerability: If the firewall allows all traffic to access the system then an attacker may be more easily able to remotely exploit a weakness in a network service. Counter Measure: Configure this setting to block inbound connections by default. Potential Impact: None, this is the default configuration. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Inbound connections (2) REG: NO INFO [block/allow] (1) GPO: Computer Configuration\\Windows Settings\\Security Settings\\Windows Firewall with Advanced Security\\Windows Firewall with Advanced Security\\Windows Firewall Properties\\Domain Profile\\Windows Firewall: Domain: Inbound connections (2) REG: NO INFO oval:org.secpod.oval:def:40270 SCAP Repo OVAL Definition 2017-04-25