goal
By default, the integrated Windows 10 Firewall allows ALL outbound connections. This seems crazy to me.
I want to block ALL outbound traffic and whitelist only those few programs which really need Internet access (mainly Thunderbird and Firefox).
what I have done so far
- I have obviously made sure that firefox.exe can connect using the default settings (allow all outbound traffic).
- Subsequently, I have set the outbound connections in "domain profile", "public profile", and "private profile" to
block– as depicted here:
- I have created allow rules for firefox.exe and ping.exe, allowing all outbound traffic (all protocols and ports) for both applications:

- I have made sure that all seemingly network-related predefined/preconfigured allow rules are active (enabled), particularly "Core Networking - DNS", etc.

- I have chatted with reasoning AI chatbots to troubleshoot.
- As suggested in https://superuser.com/a/454770 I have run this:
The output is an 8 MB .xml file. I was unable to find the culprit in it.netsh wfp capture start netsh wfp capture stop
But this part seems interesting:
"WSH default outbound block" is not listed in the Windows Firewall outbound rules. I don't know where this rule is stored/located and whether or not it has any bearing on this problem, but the same rule seems to have been the culprit in Q451862.<name>WSH Default Outbound Block</name> <description>Blocks all outbound traffic for services who have been network hardened</description> [...] <action> <type>FWP_ACTION_BLOCK</type>
result
Despite all of these steps, both firefox.exe and ping.exe fail to connect.
potential culprit
Maybe I need to whitelist some Windows component essential for networking. But as I said above, I have enabled all the predefined allow-rules that sound important for networking.
