{"id":11112,"date":"2024-03-27T13:41:14","date_gmt":"2024-03-27T12:41:14","guid":{"rendered":"https:\/\/kb.apptec360.com\/manual\/knowledgebase\/configuracao-do-pc-com-windows-10\/geral\/gestao-da-seguranca\/configuracao-de-seguranca\/configuracao-da-firewall\/"},"modified":"2024-12-04T05:04:34","modified_gmt":"2024-12-04T04:04:34","slug":"configuracao-da-firewall","status":"publish","type":"knowledgebase","link":"https:\/\/kb.apptec360.com\/manual\/pt-pt\/knowledgebase\/configuracao-do-pc-com-windows-10\/geral\/gestao-da-seguranca\/configuracao-de-seguranca\/configuracao-da-firewall\/","title":{"rendered":"Configura\u00e7\u00e3o da firewall"},"content":{"rendered":"\n<table id=\"tablepress-293\" class=\"tablepress tablepress-id-293\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=293\" rel=\"nofollow\">Edita<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\" style=\"text-align: center;\"><br\/>\n        <p><strong>Configura\u00e7\u00e3o da firewall &#8211; Defini\u00e7\u00f5es globais<\/strong><\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Ignora a autentica\u00e7\u00e3o definida<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Ignora todo o conjunto de autentica\u00e7\u00e3o se n\u00e3o suportar todos os conjuntos de autentica\u00e7\u00e3o especificados no conjunto<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Tipo de enfileiramento de pacotes<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Especifica como o escalonamento do software no lado da rece\u00e7\u00e3o \u00e9 ativado para a rece\u00e7\u00e3o encriptada e limpa o caminho de encaminhamento para o cen\u00e1rio de gateway de t\u00fanel IPsec.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Desativar a filtragem de FTP com estado<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Se estiver desactivada, n\u00e3o efectua a filtragem do Protocolo de Transfer\u00eancia de Ficheiros (FTP) com estado para permitir liga\u00e7\u00f5es secund\u00e1rias<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Tempo de inatividade da associa\u00e7\u00e3o de seguran\u00e7a<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Este campo configura o tempo de inatividade da associa\u00e7\u00e3o de seguran\u00e7a, em segundos. As associa\u00e7\u00f5es de seguran\u00e7a s\u00e3o eliminadas depois de o tr\u00e1fego de rede n\u00e3o ser visto durante este per\u00edodo de tempo especificado.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Codifica\u00e7\u00e3o de chaves pr\u00e9-partilhadas<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Define a codifica\u00e7\u00e3o da chave pr\u00e9-partilhada<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Excep\u00e7\u00f5es IPSec<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Configura as excep\u00e7\u00f5es ao Protocolo Internet<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p>Verifica\u00e7\u00e3o da lista de revoga\u00e7\u00e3o de certificados<\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<div class=\"pagebreak-after\"><\/div>\n\n<table id=\"tablepress-294\" class=\"tablepress tablepress-id-294\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=294\" rel=\"nofollow\">Edita<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\" style=\"text-align: center;\"><br\/>\n        <p><strong>Perfis de firewall (perfil de dom\u00ednio \/ perfil privado \/ perfil p\u00fablico)<\/strong><\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p>Ativar a Firewall para este perfil<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Desativar as notifica\u00e7\u00f5es<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Desactiva a apresenta\u00e7\u00e3o de notifica\u00e7\u00f5es ao utilizador quando uma aplica\u00e7\u00e3o \u00e9 impedida de escutar numa porta.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p>Bloqueia respostas unicast a transmiss\u00f5es multicast<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Aplica regras de firewall de aplica\u00e7\u00f5es autorizadas<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Se n\u00e3o for aplicada, as regras de firewall de aplica\u00e7\u00e3o autorizadas no arquivo local s\u00e3o ignoradas e n\u00e3o s\u00e3o aplicadas<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Aplica regras globais de firewall de porta<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Se n\u00e3o for aplicada, as regras globais de firewall de porta no reposit\u00f3rio local s\u00e3o ignoradas e n\u00e3o s\u00e3o aplicadas. A defini\u00e7\u00e3o s\u00f3 tem significado se for definida ou enumerada no arquivo de Pol\u00edtica de Grupo ou se for enumerada a partir do GroupPolicyRSoPStore<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Aplica regras de firewall<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Se n\u00e3o for aplicada, as regras de firewall do armazenamento local s\u00e3o ignoradas e n\u00e3o s\u00e3o aplicadas<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Aplica regras de seguran\u00e7a de liga\u00e7\u00e3o<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Se n\u00e3o for aplicada, as regras de seguran\u00e7a da liga\u00e7\u00e3o do armazenamento local s\u00e3o ignoradas e n\u00e3o s\u00e3o aplicadas<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>A\u00e7\u00e3o de sa\u00edda predefinida<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>A a\u00e7\u00e3o que a firewall executa por defeito nas liga\u00e7\u00f5es de sa\u00edda<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>A\u00e7\u00e3o de entrada predefinida<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>A a\u00e7\u00e3o que a firewall executa por defeito nas liga\u00e7\u00f5es de entrada<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Desativar o modo Stealth<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>O modo furtivo \u00e9 um mecanismo da Firewall do Windows que ajuda a impedir que utilizadores maliciosos descubram informa\u00e7\u00f5es sobre os computadores da rede e os servi\u00e7os que executam.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Desactiva a preven\u00e7\u00e3o de resposta a tr\u00e1fego n\u00e3o solicitado<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Se estiverem desactivadas, as regras do modo furtivo da firewall n\u00e3o devem impedir que o computador anfitri\u00e3o responda a tr\u00e1fego de rede n\u00e3o solicitado se esse tr\u00e1fego estiver protegido por IPsec<\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<div class=\"pagebreak-after\"><\/div>\n","protected":false},"parent":11073,"menu_order":0,"template":"","class_list":["post-11112","knowledgebase","type-knowledgebase","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/kb.apptec360.com\/manual\/pt-pt\/wp-json\/wp\/v2\/knowledgebase\/11112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.apptec360.com\/manual\/pt-pt\/wp-json\/wp\/v2\/knowledgebase"}],"about":[{"href":"https:\/\/kb.apptec360.com\/manual\/pt-pt\/wp-json\/wp\/v2\/types\/knowledgebase"}],"version-history":[{"count":1,"href":"https:\/\/kb.apptec360.com\/manual\/pt-pt\/wp-json\/wp\/v2\/knowledgebase\/11112\/revisions"}],"predecessor-version":[{"id":11118,"href":"https:\/\/kb.apptec360.com\/manual\/pt-pt\/wp-json\/wp\/v2\/knowledgebase\/11112\/revisions\/11118"}],"up":[{"embeddable":true,"href":"https:\/\/kb.apptec360.com\/manual\/pt-pt\/wp-json\/wp\/v2\/knowledgebase\/11073"}],"wp:attachment":[{"href":"https:\/\/kb.apptec360.com\/manual\/pt-pt\/wp-json\/wp\/v2\/media?parent=11112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}