Use Cases:
- Block unused ports to minimize the attack surface (e.g., blocking port
3389to prevent unauthorized external remote access). - Restrict non-essential ports to prevent policy violations by employees, such as illicit software downloads or data exfiltration.
Port:
1
2
3
Select the specific tags or individual devices to which the policy will apply.
4
Enter a description or reason for the policy (optional).