I come from a Unix background but got the task of configuring a Windows firewall on a public facing server.
I find awkward that any nmap scan I perform against the public IP reports all TCP ports from 1 to 65389 as open regardless of the Windows default rule of not allowing Inbound connections that do not match a rule.
I even got locked out of remote desktop after selecting "Block All Connections" on the Inbound rule of one of the profiles but still nmap shows:
3389/tcp open ms-term-serv
How is this explained