Use Cases:
- Block unused ports to minimize the attack surface (e.g., blocking port
3389to prevent unauthorized external remote access). - Restrict non-essential ports to prevent policy violations by employees, such as illicit software downloads or data exfiltration.
Port: