This tab displays information about authenticated users and computers whose network traffic is affected by this rule. This tab should be used only when the action for the rule is set to Allow if secure.
|To get to this tab|
In the Windows Firewall with Advanced Security MMC snap-in, expand Monitoring, and then expand Firewall.
Double-click the firewall rule you want to examine, and then click the Advanced tab.
Authorized users and computers
This is a list of the users or groups of users authorized by this rule, as configured on the Users and Computers tabs of the Firewall Rule Properties dialog box.
Excepted users and computers
This is a list of the users or groups of users who are not subject to this rule, as configured on the Users and Computers tabs of the Firewall Rule Properties dialog box. If a user or computer appears under both Authorized and Excepted, the exception takes priority, and the network traffic from that user or computer is not subject to this rule.
This is a list of the network interface types to which this rule applies (Local area network, Remote access, Wireless, or All interface types), as configured on the Advanced tab of the Firewall Rule Properties dialog box.
This indicates whether edge traversal is enabled (Allow edge traversal) or disabled (Block edge traversal). The Defer to user and Defer to application options are used to indicate that the user or application must make the decision to allow unsolicited traffic from the Internet through a network address translation (NAT) edge device. When edge traversal is enabled, the application, service, or port to which the rule applies is globally addressable and accessible from outside a NAT edge device. This setting is configured on the Advanced tab of the Firewall Rule Properties dialog box.