I am using a Windows Server 2022 VPS as a web server to host a website only. When the VPS was first setup for me, I saw the following ports for Inbound in Windows Firewall were already enabled (the port is on the very right side with TCP or UDP in front of it):
- Cast to Device streaming server (HTTP-Streaming-In) TCP 10246
- DIAL protocol server (HTTP-In) TCP 10247
- Cast to Device functionality (qWave-TCP-In) TCP 2177
- Cast to Device functionality (qWave-UDP-In) UDP 2177
- Cast to Device streaming server (RTSP-Streaming-In) TCP 23554, 23555, 23556
- Cast to Device UPnP Events (TCP-In) TCP 2869
- Microsoft Media Foundation Network Source IN UDP [UDP 5004-5009] 5000-5020
- mDNS (UDP-In) UDP 5353
- Microsoft Edge (mNDS-In) UDP 5353
- Core Networking - Dynamic Host Configuration for IPv6 (DHCPV6-In) UDP 546
- Microsoft Media Foundation Network Source IN [TCP 554] 554, 8554-8558
- Core Networking - Dynamic Host Configuration (DHCP-In) UDP 68
- Delivery Optimization (TCP-In) TCP 7680
- AllJoyn Router (TCP-In) TCP 9995
I am only using my Windows 2022 server to host a website (my website runs on ASP.net MVC, and uses IIS of course). I did not setup any of these Windows Firewall Inbound rules up. At the same time, I do want to secure my VPS, but of course, I also want my Windows 2022 VPS to function properly. Can I safely turn off the above Windows Firewall Inbound rules, to harden my VPS? Or will I run into problems if I disable some of the Windows Firewall Inbound rules above? Which rules/ports above need to be enabled and are not safe to disable?