Once policies have been deployed and synced, verify that the firewall configuration has been applied correctly on your target devices.
PowerShell Verification Commands:
# Check private network firewall profile status
Get-NetFirewallProfile -Profile Private
# Verify specific firewall settings
Get-NetFirewallProfile -Profile Private | Select-Object Name, Enabled, DefaultInboundAction, DefaultOutboundAction
# Check Windows Firewall service status
Get-Service -Name "MpsSvc" | Select-Object Name, Status, StartType
Expected output for a properly configured private network firewall:
Name : Private
Enabled : True
DefaultInboundAction : Block
DefaultOutboundAction: Allow
LogAllowed : False
LogBlocked : False
Registry Verification:
# Check MDM firewall policy registry entries
Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\MDM\DMMap\AutoEnroll\Extensions\firewall"
# Verify private profile registry settings
Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PrivateProfile"
Warning: If the firewall shows as disabled or not configured, check for conflicting Group Policy Objects (GPOs) that might be overriding Intune policies.
Verification: Confirm that Enabled shows as True and DefaultInboundAction shows as Block in the PowerShell output.