Steven said:
Well you did a good job in determining that Windows Firewall is indeed
the problem. Instead of creating exceptions for individual ports for FPS
I suggest that you try Group Policy and configuring the exemption for
file and print sharing and probably the remote administration exemption.
Of course you would need to do it in the appropriate Group Policy that
would apply to the computer accounts for the domain or standard profile
as the case may be. The settings in question are under computer
configuration/administrative templates/network/network
connections/Windows Firewall/domain or standard profile. If there are do
domain level Group Policies being applied to these computers currently
for Windows Firewall, which you could verify by running rsop.msc on the
client computer, you could try using local Group Policy [gpedit.msc] to
see if it does what you want.
Steve
We have no group policy settings across the domain for the Windows
firewall, as it is controlled here on a machine by machine basis. What
specifically would I do to ensure there are no domain GP settings for the
firewall by opening rsop.msc (or how would I check once it's open)?
On one of the affected machines, I went into gpedit.msc and enabled both
the 'Allow remote administration exception' and the 'Allow file and
printer sharing exception' and rebooted. It still did not work, so then I
changed the scope to 'any computer' setting in file and printer sharing
and rebooted, that worked. So then I went back and put in a custom
setting to accept connections on the local subnet plus connections from my
subnet, and it still doesn't work. I need those admin functions available
to me, but I think it would be unsafe to leave TCP port 139 wide open on
laptops that operate off of the network and connect via VPN sometimes.
Anyone have any more suggestions as to how to get the ideal balance of
security and admin access from here?
Steve, thanks again for all of your help, it's much appreciated!
Thanks,
capitan