![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.109558 |
Category: | Policy |
Title: | Microsoft Windows Firewall: Domain: Logging: Log dropped packets |
Summary: | Allows Windows Defender Firewall to record information about the;unsolicited incoming messages that it receives.;;If you enable this policy setting, Windows Defender Firewall writes the information to a log file.;You must provide the name, location, and maximum size of the log file. The location can contain;environment variables. You must also specify whether to record information about incoming messages;that the firewall blocks (drops) and information about successful incoming and outgoing connections.;Windows Defender Firewall does not provide an option to log successful incoming messages.;;If you are configuring the log file name, ensure that the Windows Defender Firewall service account;has write permissions to the folder containing the log file. Default path for the log file is;%systemroot%\system32\LogFiles\Firewall\pfirewall.log.;;If you disable this policy setting, Windows Defender Firewall does not record information in the log;file. If you enable this policy setting, and Windows Defender Firewall creates the log file and adds;information, then upon disabling this policy setting, Windows Defender Firewall leaves the log file;intact.;;If you do not configure this policy setting, Windows Defender Firewall behaves as if the policy;setting were disabled.;;(C) Microsoft Corporation 2015. |
Description: | Summary: Allows Windows Defender Firewall to record information about the unsolicited incoming messages that it receives. If you enable this policy setting, Windows Defender Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Defender Firewall does not provide an option to log successful incoming messages. If you are configuring the log file name, ensure that the Windows Defender Firewall service account has write permissions to the folder containing the log file. Default path for the log file is %systemroot%\system32\LogFiles\Firewall\pfirewall.log. If you disable this policy setting, Windows Defender Firewall does not record information in the log file. If you enable this policy setting, and Windows Defender Firewall creates the log file and adds information, then upon disabling this policy setting, Windows Defender Firewall leaves the log file intact. If you do not configure this policy setting, Windows Defender Firewall behaves as if the policy setting were disabled. (C) Microsoft Corporation 2015. CVSS Score: 0.0 CVSS Vector: AV:L/AC:H/Au:S/C:N/I:N/A:N |
Copyright | Copyright (C) 2018 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |