This tab has general information about the rule, including its name, a description, and whether the rule is enabled.
Each rule must have a unique name. Do not use the name “all” because that name conflicts with the all keyword used by the Netsh command-line tool.
We recommend that you provide a comprehensive description for your connection security rule. Include logical names of affected computers because the rule properties contain IP addresses only.
Select this option to activate the rule. If you clear this option, then the rule is disabled, but not deleted.