Computer step by step
 Make your Pc better
Description:  

Allows administrators to use the Windows Firewall component in Control Panel to define a local program
exceptions list. Windows Firewall uses two program exceptions lists; the other is defined by the "Windows
Firewall: Define inbound program exceptions" policy setting.

If you enable this policy setting, the Windows Firewall component in Control Panel allows administrators
to define a local program exceptions list.

If you disable this policy setting, the Windows Firewall component in Control Panel does not allow
administrators to define a local program exceptions list.  However, local administrators will still be allowed to
create firewall rules in the Windows Firewall with Advanced Security snap-in.  If you wish to prevent all locally
created rules from applying, use the Group Policy Object Editor snap-in and configure Computer Configuration
\Windows Settings\Security Settings\Windows Firewall with Advanced Security to specify that local firewall
rules should not apply.

Supported on: At least Windows XP Professional with SP2.
Windows Firewall: Allow local program
exceptions
Description Gpedit Regedit CMD Back VBScript PowerShell Script
Gpedit:   

Please perform the following steps:

Please go to Pearl button (Start) and click on the Search programs and files
For more information about the change from Start to Pearl button click here
Type gpedit.msc and press Enter
In the Group Policy window please navigate to Computer Configuration -> Administrative Templates ->
Network -> Network Connections -> Windows Firewall -> Domain Profile and open Windows Firewall:
Allow local program exceptions
.
Not Configured -> is the Default state
Enabled -> apply this GPO
Disabled -> this GPO will not be applied

To finish press ok button and close Group Policy window.
Description Gpedit Regedit CMD Up Back VBScript
Type regedit and press ok
Please confirm User Account Control pop-up
Microsoft official disclaimer

Warning Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by
using another method. These problems might require that you reinstall the operating system. Microsoft
cannot guarantee that these problems can be solved. Modify the registry at your own risk.

Note: This registry key is created by Group Policy when this GPO is Enable or Disable. The GPO Default state
is Not Configured -> this registry entry is not present.

Please navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall
\DomainProfile\AuthorizedApplications
and locate AllowUserPrefMerge registry key
Regedit:          

Please perform the following steps:

Please go to Pearl button (Start) and click on the Search programs and files
For more information about the change from Start to Pearl button click here
Description Gpedit Regedit CMD Up Back VBScript
Double click on SearchOnly and edit the value:

To Enable:
Change the data value with 1

To Disable:
Change the data value with 0

To finish press ok button and close Registry Editor window

Note: Manual editing of this registry key will not be reflected in Group Policy. If you modify this GPO from
Group Policy this registry key will be rewritten.
Description Gpedit Regedit Back CMD VBScript Up
Type cmd, right click on cmd icon under the Programs and click on Run as administrator
Please confirm User Account Control pop-up
Please select, right and copy a registry key from below, then right click on command prompt window
, select Paste and press Enter

Enabled:
REG add "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\AuthorizedApplications" /v AllowUserPrefMerge /t REG_DWORD /d 1 /f

Disabled:
REG add "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\AuthorizedApplications" /v AllowUserPrefMerge /t REG_DWORD /d 0 /f

Not Configured:
REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\AuthorizedApplications" /v AllowUserPrefMerge /f

Note: Manual editing of this registry key will not be reflected in Group Policy. If you modify this GPO from
Group Policy this registry key will be rewritten.
CMD:          

Please perform the following steps:

Please go to Pearl button (Start) and click on the Search programs and files
For more information about the change from Start to Pearl button click here
Description Gpedit Regedit Back CMD VBScript Up
VBScript:          

Const HKEY_LOCAL_MACHINE = &H80000002
strComputer = "."
Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\\" & _
strComputer & "\root\default:StdRegProv")

strKeyPath = "SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\AuthorizedApplications"
oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
strValueName = "AllowUserPrefMerge"
'Enabled
dwValue = 1
'Disabled
'dwValue = 0
oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue
'Not Configured
'oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName
Description Gpedit Regedit Back CMD VBScript Up
PowerShell Script :          

Enabled\Disabled

$RegKey = "HKLM:\SOFTWARE\Policies\Microsoft"
If(Test-Path ($RegKey + "\WindowsFirewall"))
{
$RegKey = "HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall"
If(Test-Path ($RegKey + "\DomainProfile"))
{
  $RegKey = "HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile"
  If(Test-Path ($RegKey + "\AuthorizedApplications"))
  {
    $RegKey = "HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\AuthorizedApplications"
    ##Enabled
    New-ItemProperty -path $RegKey -name AllowUserPrefMerge -value 1 -PropertyType DWord -Force
    ##Disabled
    ##New-ItemProperty -path $RegKey -name AllowUserPrefMerge -value 0 -PropertyType DWord -Force
  }
  else
  {
    New-Item -path $RegKey -name AuthorizedApplications
    $RegKey = "HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\AuthorizedApplications"
    ##Enabled
    New-ItemProperty -path $RegKey -name AllowUserPrefMerge -value 1 -PropertyType DWord
    ##Disabled
    ##New-ItemProperty -path $RegKey -name AllowUserPrefMerge -value 0 -PropertyType DWord
  }
}
else
{
  New-Item -path $RegKey -name DomainProfile
  $RegKey = "HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile"
  New-Item -path $RegKey -name AuthorizedApplications
  $RegKey = "HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\AuthorizedApplications"
  ##Enabled
  New-ItemProperty -path $RegKey -name AllowUserPrefMerge -value 1 -PropertyType DWord
  ##Disabled
  ##New-ItemProperty -path $RegKey -name AllowUserPrefMerge -value 0 -PropertyType DWord
}
}
else
{
 New-Item -path $RegKey -name WindowsFirewall
 $RegKey = "HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall"
 New-Item -path $RegKey -name DomainProfile
 $RegKey = "HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile"
 New-Item -path $RegKey -name AuthorizedApplications
  $RegKey = "HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\AuthorizedApplications"
 ##Enabled
 New-ItemProperty -path $RegKey -name AllowUserPrefMerge -value 1 -PropertyType DWord
 ##Disabled
 ##New-ItemProperty -path $RegKey -name AllowUserPrefMerge -value 0 -PropertyType DWord
}

Not Configured

$RegKey = "HKLM:\SOFTWARE\Policies\Microsoft"
Remove-ItemProperty -Path($RegKey + "\WindowsFirewall\DomainProfile\AuthorizedApplications") -name AllowUserPrefMerge
If( (Get-Item -Path($RegKey + "\WindowsFirewall\DomainProfile\AuthorizedApplications")).ValueCount -eq 0 -and (Get-Item -Path($RegKey + "\WindowsFirewall\DomainProfile\AuthorizedApplications")).SubKeyCount -eq 0)
{
Remove-Item -Path($RegKey + "\WindowsFirewall\DomainProfile\AuthorizedApplications")
If( (Get-Item -Path($RegKey + "\WindowsFirewall\DomainProfile")).ValueCount -eq 0 -and (Get-Item -Path($RegKey + "\WindowsFirewall\DomainProfile")).SubKeyCount -eq 0)
{
 Remove-Item -Path($RegKey + "\WindowsFirewall\DomainProfile")
 If( (Get-Item -Path($RegKey + "\WindowsFirewall")).ValueCount -eq 0 -and (Get-Item -Path($RegKey + "\WindowsFirewall")).SubKeyCount -eq 0)
 {
  Remove-Item -Path($RegKey + "\WindowsFirewall")
 }
}
}
Up Back PowerShell Script PowerShell Script PowerShell Script PowerShell Script PowerShell Script