Windows 11's firewall has a blind spot. These tweaks close it

PCWorld 

PCWorld highlights that Windows 11's default firewall lacks proper outgoing connection monitoring, allowing programs to send data unchecked and potentially exposing users to malware communication. The article covers essential security tweaks including enabling DNS over HTTPS encryption, activating Microsoft Defender Network Protection, and disabling obsolete protocols like NetBIOS and LLMNR. Implementing these network hardening measures transforms Windows into a more controlled system that blocks unauthorized connections and protects against credential interception attacks. Windows' built-in network protection is like a front door that is locked from the outside, but through which any resident can carry valuables outside without being checked. By default, Microsoft allows almost any program to send data out without being checked -- this is known as a lack of egress filtering. If you want to know which apps are sending data back to their developers, or wish to prevent malware from contacting its command server -- the so-called command-and-control instance -- in the event of an attack, you need to tighten the reins. With the right filters and targeted protocol hardening, you can transform the open Windows data highway into a strictly controlled border crossing that checks every outgoing packet thoroughly.