Windows Firewall: Logging/Notifying on Outgoing Request Attempts

I was trouble shooting an app I was developing a while back and ran into a brick wall. Essentially, I was having issues with an "Entity framework" being used when telecommuting. Looks like there was a connection being dropped thereby impacting an event handler for an asynch call the app was making. Well, I needed to find out what the problem was and the first thing to check was connectivity issues.

My initial inclination was a FIREWALL setting or some subnetting stuff. In *nix environments, it is pretty easy to log and view inbound/outbound connections but under Windows, you need to be a C++ or C# specialist to write an under the hood HOOK or interface to do that. Anyway, I thought there should be a way within Window FireWall app to do this, but the Devil is in the details - no documentation or better still - no pointer to any documentation on how to do this.

OK - no documentation anywhere but there is "Google" - so, nothing to worry about. I googled a phrase close to what I was looking for and it returned a couple of hits. One thing that is really annoying about some of the help sites - is that - most times, the same "hint" or help is pasted from another site without any attempt whatsoever to break it down into anything meaningful. So, if the original poster made a mistake, subsequent clones of the same hint will persist or inherit the original defect.

Fast forward, i eventually came across a link/site that attempted to explain what to do but again one or two crucial steps were missing. The basic thing steps with viewing "inbound/outbound" connections are these :

  1. Fire up Windows FireWall application. Click on the "root node" ( Windows Firewall with Advanced settings) of the Tree View on the left panel. There are three panels displayed. The middle panel will show the various profiles and the rules in place for each one of them. At the bottom of the "Overview" Group box in the middle panel, there is a link - "Windows Firewall Properties", click on it.



  2. The popped up window for "Windows FireWall Properties will display tabbed panels for the various profiles. Click on the appropriate tab and then click on the button -"customize" in the "Logging" group box at the bottom of the panel for the profile being viewed. This will bring up another popped up window from where you can toggle the options to log either or both of the inbound or outbound connections packets. Within the popped up window, is a displayed path to the log file. You will most times, need an administrative access in order to view its content.
  3. Another way of viewing the contents of the logged actions is to use the Event Viewer - again, administrative rights are required to do this. You will need to create a custom view for the events you want to view. Fire up Event Viewer. In the left panel, navigate to the "Application and Services" node. Expand on it and then select/expand the "Microsoft" sub node. Select the "Windows" node from there and finally click on the "Windows FireWall and Advanced Security". On the left hand side panel,you can create a view and filter the appropriate connection attempts you are interested in.



Comments

Popular posts from this blog

Decompiling Delphi - 3

Decompiling Delphi - 2

Artificial Intelligence, Oxymoron and Natural Intelligence