This tab has general information about the rule, including its name, a description, and whether the rule is enabled.
Name
Each rule must have a unique name. Do not use the name “all” because that name conflicts with the all keyword used by the Netsh command-line tool.
Description
We recommend that you provide a comprehensive description for your connection security rule. Include logical names of affected computers because the rule properties contain IP addresses only.
Enabled
Select this option to activate the rule. If you clear this option, then the rule is disabled, but not deleted.