How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr

How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr. Creating Windows Firewall Rules for SCCM or ConfigMgr clients is pretty straightforward.

I was trying to deploy a client in my lab, and I don’t want to disable Windows Firewall to get SCCM 2012 client to work.

Normally, I used to disable Windows Firewall in the LAB environment to have easy life ;). In this case, the SCCM 2012 client push was not working because Firewall was getting in between.

Create Windows Firewall Inbound Rules

The documentation provided in Technet for creating Windows Firewall Rule Settings is excellent. More details TechNet documentation. However, I felt like this kind of post would be very helpful for newbies.

Patch My PC

This will help them create and master Inbound rules in Windows Firewall settings.

I’ve another post which talks “How to Create Windows Firewall Outbound Rules Using PowerShell for SCCM ConfigMgr 2012 Client.”

How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr
How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr

We’ll learn how to create Inbound Windows Firewall Rules for SCCM (ConfigMgr) clients through this post. SCCM client uses components like WMI, RPC End Point Mapper, Remote Control, ICMP for wakeup lan & File, and Printer Sharing to communicate with SCCM site servers.

These connections/communications are blocked by Windows Firewall (by default), so we need to specifically open the required ports and applications, whichever is needed.

Adaptiva

This step-by-step guide (not very specific to SCCM/ConfigMgr) will help anyone create an Inbound Windows Firewall rule(s). We can create windows Firewall inbound Rule with different rule types like Program, Port, Predefined, and custom. I’ll cover the guide to creating Outbound Rules in Windows Firewall in the next post.

How to Create Windows Firewall Inbound Rules for SCCM

In this post, I’m going to cover the following step-by-step guides. I’ve not covered all the Firewall rules required for all the features of SCCM 2012. However, I tried to cover one example each with all scenarios.

  1. How to Create “WMI” Inbound Windows Firewall Rule for SCCM ConfigMgr 2012 client push?
  2. How to Create “File and Printer Sharing” Inbound Firewall Rule for SCCM ConfigMgr client?
  3. How to Configure Windows Firewall to “Allow ICMP or Ping Response”?
  4. How do we create an inbound “custom port TCP or UDP in Windows Firewall?

How to Create WMI Inbound Windows Firewall Rule for SCCM ConfigMgr 2012 client push?

  1. Type WF from the command prompt to launch Windows Firewall with Advanced Security
How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr
How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr

2. On the Windows Firewall with Advanced Security page, Right-click on Inbound Rules and click on the new rule.

Windows Firewall Rule

3. On the Rule Type page, Select the Predefined Rule Creation option and from the drop-down list, select the Windows Management Instrumentation (WMI) rule and click NEXT

How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr
How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr

4. On the Predefined Rules page, we need to select all the rules of WMI Inbound connections, which we need to enable for Client push and other SCCM ConfigMgr related activities, then Click NEXT.

Windows Management Instrumentation (ASync-In), Windows Management Instrumentation (WMI-In), Windows Management Instrumentation (DCOM-In), Windows Management Instrumentation (ASync-In), Windows Management Instrumentation (WMI-In), and Windows Management Instrumentation (DCOM-In) are the rules which we’re going to create.

How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr
How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr

5. On the Action page Select Allow the Connection option in the WMI inbound rule and click FINISH

How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr
How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr

How to Create File and Printer Sharing Inbound Windows Firewall Rule for SCCM ConfigMgr client?

  1. On the Windows Firewall with Advanced Security page, Right-click on Inbound Rules and click on the new rule.
Windows Firewall Rule

2. On the Rule Type page, Select the Predefined Rule Creation option and from the drop-down list, select the File and Printer Sharing rule and click NEXT

How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr
How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr

3. On the Predefined Rules page, we need to select all the rules of File and Printer Sharing Inbound connections, which we need to enable Client push and other SCCM ConfigMgr related activities, then Click NEXT.

How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr
How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr

4. On the Action page Select Allow the Connection option inbound rule page and click FINISH.

Windows Firewall Rule 8

How to Configure Windows Firewall to Allow ICMP or Ping Response?

Note : When you're running SCCM /ConfigMgr 2012 R2 and above then you don't need to create this inbound Windows Firewall rule for Wakeup Proxy at SCCM Client side.
  1. On the Windows Firewall and Advanced Security page, Right-click on Inbound Rules and click on the new rule.
Windows Firewall Rule

2. On the Rule Type page, Select Rule Type as Custom, then click Next.

How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr
How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr

3. On the PROGRAM page, Select All Programs and click NEXT.

Windows Firewall Rule 10

4. On the Protocols and Ports page, click the drop-down for Protocol type, select ICMPv4, and click the Customize button.

How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr
How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr

5. In the Customize ICMP Settings dialog box, we need to click on Specific ICMP types, select Echo-Request, and click OK.

And on the Inbound Wizard page, click NEXT.

How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr
How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr

6. On the SCOPE page, we need to select Any IP Address under the session “which local IP addresses does this rule apply to”  and Any IP Address under the session “which remote IP addresses does this rule apply to”

How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr
How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr

7. We need to select Allow the connection and click on the action page.

Windows Firewall Rule 14

8. On the Profile page, select all the profiles (Domain, Private and Public); however, to wake up a proxy, you would require only Domain and hit NEXT.

Windows Firewall Rule 15

9. On the Name page, Select a suitable name for the Inbound rule and then click FINISH.

How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr
How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr

How do we create an inbound custom port TCP or UDP in Windows Firewall?

From the ConfigMgr SCCM client perspective, we need to create Inbound rules for the following ports TCP Port 2701 for Remote Control and TCP port 135 for Remote Assistance + Remote Desktop.

  1. On the Windows Firewall and Advanced Security page, Right-click on Inbound Rules and click on the new rule.
Windows Firewall Rule

2. On the Rule Type page, Select Rule Type as Port, then click Next.

Windows Firewall Rule 17

3. On the Protocol and Ports page, we must specify the protocols and ports to which this rule applies. Select TCP or UDP protocol depending upon your requirements. After that, type in the local ports, then click next.

Windows Firewall Rule 18

4. On the Action page Select Allow the connection and click NEXT.

Windows Firewall Rule 19

5. On the profile page, select all the required profiles as per your requirements. I’ve selected all the available three profiles and then clicked NEXT.

Windows Firewall Rule 20

6. On the Name page, Select a suitable name for the Inbound rule and then click FINISH.

Windows Firewall Rule 21

Following are the Name of Inbound rules which I’ve created for SCCM ConfigMgr.

NameGroupProfileEnabledAction
ICMP Wake-up proxy communication AllYesAllow
RPC End Point Mapper AllYesAllow
Configuration Manager remote control AllYesAllow
Windows Management Instrumentation (ASync-In)Windows Management Instrumentation (WMI)Private, PublicYesAllow
Windows Management Instrumentation (WMI-In)Windows Management Instrumentation (WMI)Private, PublicYesAllow
Windows Management Instrumentation (DCOM-In)Windows Management Instrumentation (WMI)Private, PublicYesAllow
Windows Management Instrumentation (ASync-In)Windows Management Instrumentation (WMI)DomainYesAllow
Windows Management Instrumentation (WMI-In)Windows Management Instrumentation (WMI)DomainYesAllow
Windows Management Instrumentation (DCOM-In)Windows Management Instrumentation (WMI)DomainYesAllow
File and Printer Sharing (LLMNR-UDP-In)File and Printer SharingAllYesAllow
File and Printer Sharing (Echo Request – ICMPv6-In)File and Printer SharingPrivate, PublicYesAllow
File and Printer Sharing (Echo Request – ICMPv4-In)File and Printer SharingPrivate, PublicYesAllow
File and Printer Sharing (Spooler Service – RPC-EPMAP)File and Printer SharingPrivate, PublicYesAllow
File and Printer Sharing (Spooler Service – RPC)File and Printer SharingPrivate, PublicYesAllow
File and Printer Sharing (NB-Datagram-In)File and Printer SharingPrivate, PublicYesAllow
File and Printer Sharing (NB-Name-In)File and Printer SharingPrivate, PublicYesAllow
File and Printer Sharing (SMB-In)File and Printer SharingPrivate, PublicYesAllow
File and Printer Sharing (NB-Session-In)File and Printer SharingPrivate, PublicYesAllow
File and Printer Sharing (Echo Request – ICMPv6-In)File and Printer SharingDomainYesAllow
File and Printer Sharing (Echo Request – ICMPv4-In)File and Printer SharingDomainYesAllow
File and Printer Sharing (Spooler Service – RPC-EPMAP)File and Printer SharingDomainYesAllow
File and Printer Sharing (Spooler Service – RPC)File and Printer SharingDomainYesAllow
File and Printer Sharing (NB-Datagram-In)File and Printer SharingDomainYesAllow
File and Printer Sharing (NB-Name-In)File and Printer SharingDomainYesAllow
File and Printer Sharing (SMB-In)File and Printer SharingDomainYesAllow
File and Printer Sharing (NB-Session-In)File and Printer SharingDomainYesAllow

Resources

SCCM Related Posts Real World Experiences Of SCCM Admins (anoopcnair.com)

Author

Anoop is Microsoft MVP! He is a Solution Architect in enterprise client management with more than 20 years of experience (calculation done in 2021) in IT. He is a blogger, Speaker, and Local User Group HTMD Community leader. His main focus is on Device Management technologies like SCCM 2012, Current Branch, and Intune. E writes about ConfigMgr, Windows 11, Windows 10, Azure AD, Microsoft Intune, Windows 365, AVD, etc…

6 thoughts on “How to Create Windows Firewall Inbound Rules for SCCM ConfigMgr Client Configuration Manager ConfigMgr”

  1. Hi,

    So you are opening WMI, File print and sharing, RDP,…on the Public profile of the firewall, that means your clients are vulnerable when outside the corporate network.
    Isn’t it a security risk to allow all these for laptops of roaming users?

    Reply
  2. This article should be called “How to ensure that you get hacked”
    No one should be exposing all these ports to the public profile, you’re just asking to get compromised.

    Reply
  3. Nowhere does Microsoft say to open up the Public profile for these rules. Can you point to where that is specified in the documentation?

    Reply

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.