1657 | Firewall log files (*.log) *.log |
Firewall log files (*.log) *.log |
1658 | Browse |
Browse |
1659 | log |
log |
1675 | The value entered for the log file size is not valid. Enter a value between 1 and 32767 k. |
The value entered for the log file size is not valid. Enter a value between 1 and 32767 k. |
23000 | File and Printer Sharing |
File and Printer Sharing |
23001 | NetBIOS Name Service |
NetBIOS Name Service |
23002 | NetBIOS Datagram Service |
NetBIOS Datagram Service |
23004 | NetBIOS Session Service |
NetBIOS Session Service |
23005 | SMB over TCP |
SMB over TCP |
23006 | UPnP Framework |
UPnP Framework |
23007 | SSDP Component of UPnP Framework |
SSDP Component of UPnP Framework |
23008 | UPnP Framework over TCP |
UPnP Framework over TCP |
23009 | Remote Desktop |
Remote Desktop |
23012 | Domain Name Server (DNS) |
Domain Name Server (DNS) |
23013 | Dynamic Host Configuration Protocol Server (DHCP) |
Dynamic Host Configuration Protocol Server (DHCP) |
23014 | Dynamic Host Configuration Protocol Client (DHCP) |
Dynamic Host Configuration Protocol Client (DHCP) |
23015 | Incoming Connection VPN (PPTP) |
Incoming Connection VPN (PPTP) |
23016 | Incoming Connection VPN (L2TP) |
Incoming Connection VPN (L2TP) |
23017 | IP Security (IPsec - IKE) |
IP Security (IPsec - IKE) |
23018 | IP Security (IPsec - IKE/NAT-T) |
IP Security (IPsec - IKE/NAT-T) |
23038 | Phase 1: Local address = %s, Remote address = %s |
Phase 1: Local address = %s, Remote address = %s |
23039 | Phase 2: Local address = %s, Remote address = %s |
Phase 2: Local address = %s, Remote address = %s |
23040 | , Protocol = 0x%x |
, Protocol = 0x%x |
23041 | , Protocol = Any |
, Protocol = Any |
23042 | , Local port = 0x%x |
, Local port = 0x%x |
23043 | , Local port = Any |
, Local port = Any |
23044 | , Remote port = 0x%x |
, Remote port = 0x%x |
23045 | , Remote port = Any |
, Remote port = Any |
23090 | Windows Firewall |
Windows Firewall |
23091 | Windows Firewall helps protect your computer by preventing unauthorised users from gaining access to your computer through the Internet or a network. |
Windows Firewall helps protect your computer by preventing unauthorized users from gaining access to your computer through the Internet or a network. |
23092 | Windows Firewall Authorisation Driver |
Windows Firewall Authorization Driver |
23093 | Windows Firewall Authorisation Driver is a kernel mode driver that provides deep inspection services on inbound and outbound network traffic. |
Windows Firewall Authorization Driver is a kernel mode driver that provides deep inspection services on inbound and outbound network traffic. |
23094 | Allow authenticated IPsec bypass |
Allow authenticated IPsec bypass |
23095 | Allows specific computers to have unrestricted, but authenticated, access to the computer. |
Allows specific computers to have unrestricted, but authenticated, access to the computer. |
23100 | Yes |
Yes |
23101 | No |
No |
23102 | Enabled |
Enabled |
23103 | Disabled |
Disabled |
23104 | Group Policy |
Group Policy |
23105 | Local Policy |
Local Policy |
23106 | Group and Local Policy |
Group and Local Policy |
23107 | Domain |
Domain |
23108 | Private |
Private |
23109 | All interfaces |
All interfaces |
23110 | Off |
Off |
23111 | On |
On |
23112 | Don't allow exceptions |
Don't allow exceptions |
23113 | All subnets |
All subnets |
23114 | Local subnet only |
Local subnet only |
23115 | Custom subnets |
Custom subnets |
23116 | Add |
Add |
23117 | Remove |
Remove |
23118 | Modify |
Modify |
23119 | Allow outgoing destination unreachable |
Allow outgoing destination unreachable |
23120 | Allow outgoing source quench |
Allow outgoing source quench |
23121 | Allow redirect |
Allow redirect |
23122 | Allow incoming echo request |
Allow incoming echo request |
23123 | Allow incoming router request |
Allow incoming router request |
23124 | Allow outgoing time exceeded |
Allow outgoing time exceeded |
23125 | Allow outgoing parameter problem |
Allow outgoing parameter problem |
23126 | Allow incoming timestamp request |
Allow incoming timestamp request |
23127 | Allow incoming mask request |
Allow incoming mask request |
23128 | Allow outgoing packet too big |
Allow outgoing packet too big |
23129 | The rule was parsed successfully from the store. |
The rule was parsed successfully from the store. |
23130 | The rule is from a later version of the service. Some fields were not understood and have been ignored. This may cause the rule to be less restrictive than on the version where it was created. To mitigate any risk from this fall-back behaviour, ensure that the original rule is as specific as possible. To avoid this fall-back behaviour, create version-specific GPOs or apply a Platform condition to the rule. |
The rule is from a later version of the service. Some fields were not understood and have been ignored. This may cause the rule to be less restrictive than on the version where it was created. To mitigate any risk from this fallback behavior, ensure that the original rule is as specific as possible. To avoid this fallback behavior, create version-specific GPO's, or apply a Platform condition to the rule. |
23131 | The rule is from a newer schema version than the service and the unknown fields could not be ignored. The whole rule was ignored. |
The rule is from a newer schema version than the service, and the unknown fields could not be ignored. The whole rule was ignored. |
23132 | The name contains invalid characters or is an invalid length. |
The name contains invalid characters, or is an invalid length. |
23133 | The description contains invalid characters or is an invalid length. |
The description contains invalid characters, or is an invalid length. |
23134 | The application contains invalid characters or is an invalid length. |
The application contains invalid characters, or is an invalid length. |
23135 | The service contains invalid characters or is an invalid length. |
The service contains invalid characters, or is an invalid length. |
23136 | The authorised remote machines list contains invalid characters or is an invalid length. |
The authorized remote machines list contains invalid characters, or is an invalid length. |
23137 | The authorised remote users list contains invalid characters or is an invalid length. |
The authorized remote users list contains invalid characters, or is an invalid length. |
23138 | The group (sometimes called the embedded context) contains invalid characters or is an invalid length. |
The group (sometimes called the embedded context) contains invalid characters, or is an invalid length. |
23139 | The service was unable to parse the rule. |
The service was unable to parse the rule. |
23140 | An invalid port range was specified or 0 was used as a port number. |
An invalid port range was specified, or 0 was used as a port number. |
23141 | Some of the keywords specified on the remote address are only valid on the local address. |
Some of the keywords specified on the remote address are only valid on the local address. |
23142 | Number of interfaces and interface buffer don't match. |
Number of interfaces and interface buffer don't match. |
23143 | The interface type is invalid. |
The interface type is invalid. |
23144 | The action is invalid. |
The action is invalid. |
23145 | The direction is invalid. |
The direction is invalid. |
23146 | The protocol-specific options do not match the protocol that was chosen. |
The protocol-specific options do not match the protocol that was chosen. |
23147 | The rule was parsed successfully but there was an unknown semantic error when processing the rule. |
The rule was parsed successfully, but there was an unknown semantic error when processing the rule. |
23148 | An error occurred. |
An error occurred. |
23149 | Enable Windows Firewall |
Enable Windows Firewall |
23150 | Disable Stealth Mode |
Disable Stealth Mode |
23151 | Windows Firewall Shielded Mode |
Windows Firewall Shielded Mode |
23152 | Disable Unicast Responses to Multicast |
Disable Unicast Responses to Multicast |
23153 | Log Dropped Packets |
Log Dropped Packets |
23154 | Log Successful Connections |
Log Successful Connections |
23155 | Log Ignored Rules |
Log Ignored Rules |
23156 | Maximum Log File Size |
Maximum Log File Size |
23157 | Log File Path |
Log File Path |
23158 | Disable Inbound Notifications |
Disable Inbound Notifications |
23159 | Allow User preferred merge of Authorised Applications |
Allow User preferred merge of Authorized Applications |
23160 | Allow User preferred merge of Globally open ports |
Allow User preferred merge of Globally open ports |
23161 | Allow Local Policy Merge |
Allow Local Policy Merge |
23162 | Allow Local IPsec Policy Merge |
Allow Local IPsec Policy Merge |
23163 | Disabled Interfaces |
Disabled Interfaces |
23164 | Default Outbound Action |
Default Outbound Action |
23165 | Default Inbound Action |
Default Inbound Action |
23166 | Current Profile |
Current Profile |
23167 | Disable Stateful FTP |
Disable Stateful FTP |
23168 | Ignored Disable Stateful PPTP |
Ignored Disable Stateful PPTP |
23169 | IPsec SA Idle time |
IPsec SA Idle time |
23170 | IPsec pre-shared key encoding |
IPsec preshared key encoding |
23171 | IPsec Exempt |
IPsec Exempt |
23172 | IPsec CRL Check |
IPsec CRL Check |
23173 | |
|
23174 | Allow |
Allow |
23175 | Block |
Block |
23176 | The rule ID contains invalid characters or is an invalid length. |
The rule ID contains invalid characters, or is an invalid length. |
23177 | The phase 1 auth set ID contains invalid characters or is an invalid length. |
The phase 1 auth set ID contains invalid characters, or is an invalid length. |
23178 | The quick mode crypto set ID contains invalid characters or is an invalid length. |
The quick mode crypto set ID contains invalid characters, or is an invalid length. |
23179 | The main mode crypto set ID contains invalid characters or is an invalid length. |
The main mode crypto set ID contains invalid characters, or is an invalid length. |
23180 | The application name could not be resolved. |
The application name could not be resolved. |
23181 | The Rule ID was not specified. |
The Rule ID was not specified. |
23182 | Mismatch in number of ports and ports buffer. |
Mismatch in number of ports and ports buffer. |
23183 | One of the port keywords is invalid. |
One of the port keywords is invalid. |
23184 | Mismatch in number of V4 address subnets and subnets buffer. |
Mismatch in number of V4 address subnets and subnets buffer. |
23185 | Mismatch in number of V6 address subnets and subnets buffer. |
Mismatch in number of V6 address subnets and subnets buffer. |
23186 | Mismatch in number of V4 address ranges and ranges buffer. |
Mismatch in number of V4 address ranges and ranges buffer. |
23187 | Mismatch in number of V6 address ranges and ranges buffer. |
Mismatch in number of V6 address ranges and ranges buffer. |
23188 | The address range is invalid. The end address is less than the beginning address. |
The address range is invalid. The end address is less than the beginning address. |
23189 | One or more of the subnet masks is invalid. |
One or more of the subnet masks is invalid. |
23190 | One or more of the address prefixes is invalid. |
One or more of the address prefixes is invalid. |
23191 | One or more of the address keywords are invalid. |
One or more of the address keywords are invalid. |
23192 | Some of the keywords specified on the local address are only valid on the remote address. |
Some of the keywords specified on the local address are only valid on the remote address. |
23193 | Mismatch in number of ICMP and ICMP buffer. |
Mismatch in number of ICMP and ICMP buffer. |
23194 | Invalid ICMP code specified. |
Invalid ICMP code specified. |
23195 | Allow-Bypass action specified but the rule does not meet allow-bypass criteria (inbound, authenticate/encrypt flags set, remote machine auth list specified) |
Allow-Bypass action specified, but the rule does not meet allow-bypass criteria (inbound, authenticate/encrypt flags set, remote machine auth list specified) |
23196 | The protocol number is invalid. |
The protocol number is invalid. |
23197 | Invalid flags specified. |
Invalid flags specified. |
23198 | Autogenerate flag is set but Authenticate / Authenticate-encrypt flags are not set. |
Autogenerate flag is set but Authenticate / Authenticate-encrypt flags are not set. |
23199 | Autogenerate flag is set but the action is blocked. |
Autogenerate flag is set but the action is block. |
23200 | Autogenerate flag is set along with Dynamic RPC flag. |
Autogenerate flag is set along with Dynamic RPC flag. |
23201 | The Authentication and Authentication & Encryption flags cannot be used together. |
The Authentication and Authentication & Encryption flags cannot be used together. |
23202 | Authorisation lists can only be used if authentication is required on the rule. |
Authorization lists can only be used if authentication is required on the rule. |
23203 | Number of valid OS Platforms and the list of valid OS Platforms doesn't match |
Number of valid OS Platforms and the list of valid OS Platforms don't match |
23204 | The phase 1 auth set ID must be specified. |
The phase 1 auth set ID must be specified. |
23205 | The quick mode crypto set ID must be specified. |
The quick mode crypto set ID must be specified. |
23206 | The Set ID was not specified. |
The Set ID was not specified. |
23207 | The IPsec phase is invalid. |
The IPsec phase is invalid. |
23208 | No suites specified in the set. |
No suites specified in the set. |
23209 | One of the phase 1 auth methods is invalid. |
One of the phase 1 auth methods is invalid. |
23210 | One of the phase 2 auth methods is invalid. |
One of the phase 2 auth methods is invalid. |
23211 | Anonymous cannot be the only authentication method. |
Anonymous cannot be the only authentication method. |
23212 | Invalid auth suite flags specified. |
Invalid auth suite flags specified. |
23213 | Machine certificates can only be used in phase 2 auth if they are machine health certificates. |
Machine certificates can only be used in phase 2 auth if they are machine health certificates. |
23214 | Machine Pre-shared Key was selected as an authentication type but no key string was specified. |
Machine Preshared Key was selected as an authentication type, but no key string was specified. |
23215 | The certificate authority name is required and must be formatted as an X.509 distinguished name. |
The certificate authority name is required, and must be formatted as an X.509 distinguished name. |
23216 | Both machine and user auth cannot be proposed within the same authentication set. |
Both machine and user auth cannot be proposed within the same authentication set. |
23217 | The main mode crypto set ID must be specified. |
The main mode crypto set ID must be specified. |
23218 | The phase 1 crypto set flags are invalid. |
The phase 1 crypto set flags are invalid. |
23219 | The main mode lifetime, in minutes, is invalid. |
The main mode lifetime, in minutes, is invalid. |
23220 | The main mode lifetime, in sessions, is invalid. |
The main mode lifetime, in sessions, is invalid. |
23221 | One of the main mode key exchange algorithms is invalid. |
One of the main mode key exchange algorithms is invalid. |
23222 | One of the main mode encryption algorithms is invalid. |
One of the main mode encryption algorithms is invalid. |
23223 | One of the main mode hash algorithms is invalid. |
One of the main mode hash algorithms is invalid. |
23224 | One of the quick mode key exchange algorithms is invalid. |
One of the quick mode key exchange algorithms is invalid. |
23225 | One of the quick mode encapsulation types is invalid. |
One of the quick mode encapsulation types is invalid. |
23226 | One of the quick mode encryption algorithms is invalid. |
One of the quick mode encryption algorithms is invalid. |
23227 | One of the quick mode hash algorithms is invalid. |
One of the quick mode hash algorithms is invalid. |
23228 | The quick mode lifetime, in minutes, is invalid. |
The quick mode lifetime, in minutes, is invalid. |
23229 | The quick mode lifetime, in kilobytes, is invalid. |
The quick mode lifetime, in kilobytes, is invalid. |
23230 | Remote user authorisation can only be applied to inbound rules. |
Remote user authorization can only be applied to inbound rules. |
23231 | An unspecified, multicast, broadcast or loopback IPv6 address was specified. |
An unspecified, multicast, broadcast, or loopback IPv6 address was specified. |
23232 | If the action is Do Not Secure, the auth and crypto sets must be null. |
If the action is Do Not Secure, the auth and crypto sets must be null. |
23233 | Either Encryption or Hash must be specified. |
Either Encryption or Hash must be specified. |
23234 | Block action was specified in conjunction with require security or require encryption. |
Block action was specified in conjunction with require security or require encryption. |
23235 | The phase 1 authentication set was not found. |
The phase 1 authentication set was not found. |
23236 | The phase 2 authentication set was not found. |
The phase 2 authentication set was not found. |
23237 | The quick mode cryptographic set was not found. |
The quick mode cryptographic set was not found. |
23238 | A conflict was detected between the phase 1 and phase 2 authentication sets. When pre-shared keys are used in phase 1, there cannot be a phase 2 authentication set. |
A conflict was detected between the phase 1 and phase 2 authentication sets. When preshared keys are used in phase 1, there cannot be a phase 2 authentication set. |
23239 | A local address cannot be used in conjunction with an interface or interface type condition. |
A local address cannot be used in conjunction with an interface or interface type condition. |
23240 | Program Name |
Program Name |
23241 | Interfaces |
Interfaces |
23242 | Local Addresses |
Local Addresses |
23243 | Remote Addresses |
Remote Addresses |
23244 | Local Port |
Local Port |
23245 | Remote Port |
Remote Port |
23246 | EndPoint 1 Addresses |
EndPoint 1 Addresses |
23247 | EndPoint 2 Addresses |
EndPoint 2 Addresses |
23248 | Endpoint 1 Port |
Endpoint 1 Port |
23249 | Endpoint 2 Port |
Endpoint 2 Port |
23250 | Not Configured |
Not Configured |
23251 | The profile type is invalid. |
The profile type is invalid. |
23252 | Public |
Public |
23253 | An unspecified, multicast, broadcast or loopback IPv4 address was specified. |
An unspecified, multicast, broadcast, or loopback IPv4 address was specified. |
23254 | Machine health certificates and regular certificates cannot both be proposed within the same authentication set. |
Machine health certificates and regular certificates cannot both be proposed within the same authentication set. |
23255 | None |
None |
23256 | Endpoint 'any' cannot be specified for a tunnel-mode rule. |
Endpoint 'any' cannot be specified for a tunnel-mode rule. |
23257 | IPsec Through NAT |
IPsec Through NAT |
23258 | Policy Version |
Policy Version |
23259 | The target schema version specified is not supported. |
The target schema version specified is not supported. |
23260 | The same authentication method cannot be used more than once within a set. |
The same authentication method cannot be used more than once within a set. |
23261 | This error value is not used. |
This error value is not used. |
23262 | The target schema version does not support port ranges. |
The target schema version does not support port ranges. |
23263 | The Authentication (Dynamic Encryption) flag cannot be used when direction is Outbound. |
The Authentication (Dynamic Encryption) flag cannot be used when direction is Outbound. |
23264 | When the Authentication (Dynamic Encryption) flag is set, the Authentication & Encryption flag must also be set. |
When the Authentication (Dynamic Encryption) flag is set, the Authentication & Encryption flag must be set as well. |
23265 | The target schema version does not support Authentication (Dynamic Encryption). |
The target schema version does not support Authentication (Dynamic Encryption). |
23266 | The target schema version does not support outbound Allow-Bypass rules. |
The target schema version does not support outbound Allow-Bypass rules. |
23267 | Allow-Bypass action specified but the rule does not meet allow-bypass criteria (authenticate/encrypt flags set) |
Allow-Bypass action specified, but the rule does not meet allow-bypass criteria (authenticate/encrypt flags set) |
23268 | Defer to user setting can only be used in a firewall rule where program path and TCP/UDP protocol are specified with no additional conditions. |
Defer to user' setting can only be used in a firewall rule where program path and TCP/UDP protocol are specified with no additional conditions. |
23269 | Port ranges are only allowed in connection security rules when the action is Do Not Secure. |
Port ranges are only allowed in connection security rules when the action is Do Not Secure. |
23270 | The target schema version does not support the platform operator specified. |
The target schema version does not support the platform operator specified. |
23271 | The DTM flag requires at least one dynamic endpoint. |
The DTM flag requires at least one dynamic endpoint. |
23272 | A dynamic tunnel-mode exemption rule cannot have tunnel endpoints. |
A dynamic tunnel-mode exemption rule cannot have tunnel endpoints. |
23273 | The target schema version does not support tunnel-mode exemptions. |
The target schema version does not support tunnel-mode exemptions. |
23274 | Authentication mode, "Require inbound and clear outbound" can only be set when using IPsec tunnelling. |
Authentication mode,"Require inbound and clear outbound" can only be set when using IPsec tunneling. |
23275 | Bypass Tunnel If Secure may not be set on Transport-Mode rules. |
Bypass Tunnel If Secure may not be set on Transport-Mode rules. |
23276 | One of the platform operators is invalid. |
One of the platform operators is invalid. |
23277 | %s unregistered from Windows Firewall. |
%s unregistered from Windows Firewall. |
23278 | %s unregistered from Windows Firewall. Windows Firewall is now controlling the filtering for %s. |
%s unregistered from Windows Firewall. Windows Firewall is now controlling the filtering for %s. |
23279 | FirewallRuleCategory |
FirewallRuleCategory |
23280 | ConSecRuleCategory |
ConSecRuleCategory |
23281 | StealthRuleCategory |
StealthRuleCategory |
23282 | BootTimeRuleCategory |
BootTimeRuleCategory |
23283 | , |
, |
23284 | Authentication (No Encapsulation) cannot be specified on a tunnel-mode rule. |
Authentication (No Encapsulation) cannot be specified on a tunnel-mode rule. |
23285 | Authentication (No Encapsulation) cannot be specified on a rule that uses a pre-shared key. |
Authentication (No Encapsulation) cannot be specified on a rule that uses a preshared key. |
23286 | The target schema version does not support certificate criteria. |
The target schema version does not support certificate criteria. |
23287 | Certificate criteria version does not match schema version. |
Certificate criteria version does not match schema version. |
23288 | The certificate criteria are invalid. A thumbprint hash must be specified when FollowRenewal is used. |
The certificate criteria are invalid. A thumbprint hash must be specified when FollowRenewal is used. |
23289 | The certificate criteria are invalid. The thumbprint hash is invalid. |
The certificate criteria are invalid. The thumbprint hash is invalid. |
23290 | The certificate criteria are invalid. One or more of the EKUs is invalid. |
The certificate criteria are invalid. One or more of the EKU's are invalid. |
23291 | The certificate criteria are invalid. The name type is invalid. |
The certificate criteria are invalid. The name type is invalid. |
23292 | The certificate criteria are invalid. The subject name is not valid. |
The certificate criteria are invalid. The subject name is not valid. |
23293 | The certificate criteria are invalid. The criteria type flags are invalid. |
The certificate criteria are invalid. The criteria type flags are invalid. |
23294 | The certificate criteria are invalid. You need to specify at least one set of validation criteria and one set of selection criteria for each set of certificate proposals with the same signing method. |
The certificate criteria are invalid. You need to specify at least one set of validation criteria and one set of selection criteria for each set of certificate proposal with the same signing method. |
23295 | The local user authorisation list contains invalid characters or is an invalid length. |
The local user authorization list contains invalid characters, or is an invalid length. |
23296 | The authorised local user list may not be used in conjunction with a service SID. |
The authorized local user list may not be used in conjunction with a service SID. |
23297 | The target schema version does not support the authorised local user list. |
The target schema version does not support the authorized local user list. |
23298 | Disable Stealth Mode IPsec Secured Packet Exemption |
Disable Stealth Mode IPsec Secured Packet Exemption |
23299 | The Kerberos proxy name must be a fully qualified domain name (FQDN). For example: kerbproxy.contoso.com |
The Kerberos proxy name must be a fully qualified domain name (FQDN). For example: kerbproxy.contoso.com |
23300 | IPsec Policy Agent service hardening - LDAP/TCP |
IPsec Policy Agent service hardening - LDAP/TCP |
23301 | Allow IPsec Policy Agent outbound LDAP/TCP traffic to Active Directory |
Allow IPsec Policy Agent outbound LDAP/TCP traffic to Active Directory |
23302 | IPsec Policy Agent service hardening - LDAP/UDP |
IPsec Policy Agent service hardening - LDAP/UDP |
23303 | Allow IPsec Policy Agent outbound LDAP/UDP traffic to Active Directory |
Allow IPsec Policy Agent outbound LDAP/UDP traffic to Active Directory |
23304 | IPsec Policy Agent service hardening - Block any other traffic to IPsec Policy Agent |
IPsec Policy Agent service hardening - Block any other traffic to IPsec Policy Agent |
23305 | IPsec Policy Agent service hardening - Block any other traffic from IPsec Policy Agent |
IPsec Policy Agent service hardening - Block any other traffic from IPsec Policy Agent |
23306 | MpsSvc service hardening - Block any other traffic to MpsSvc |
MpsSvc service hardening - Block any other traffic to MpsSvc |
23307 | MpsSvc service hardening - Block any other traffic from MpsSvc |
MpsSvc service hardening - Block any other traffic from MpsSvc |
23308 | Inbound service restriction rule for %1!s! |
Inbound service restriction rule for %1!s! |
23309 | Block all inbound traffic to service %1!s! |
Block all inbound traffic to service %1!s! |
23310 | Outbound service restriction rule for %1!s! |
Outbound service restriction rule for %1!s! |
23311 | Block all outbound traffic from service %1!s! |
Block all outbound traffic from service %1!s! |
23312 | IPsec Policy Agent service hardening - Remote Management |
IPsec Policy Agent service hardening - Remote Management |
23313 | Allow IPsec Policy Agent inbound RPC/TCP traffic for Remote Management |
Allow IPsec Policy Agent inbound RPC/TCP traffic for Remote Management |
23400 | The remote endpoints are invalid. |
The remote endpoints are invalid. |
23401 | The remote endpoint FQDN is invalid. |
The remote endpoint FQDN is invalid. |
23402 | The choice of key modules is invalid. |
The choice of key modules is invalid. |
23403 | The forward path SA lifetime is invalid. |
The forward path SA lifetime is invalid. |
23404 | The target schema version does not support custom key module preferences. |
The target schema version does not support custom key module preferences. |
23405 | The target schema version does not support transport rule machine authorisation lists. |
The target schema version does not support transport rule machine authorization lists. |
23406 | The target schema version does not support transport rule user authorisation lists. |
The target schema version does not support transport rule user authorization lists. |
23407 | Transport machine authorisation SDDL specified on tunnel-mode rule. |
Transport machine authorization SDDL specified on tunnel-mode rule. |
23408 | Transport user authorisation SDDL specified on tunnel-mode rule. |
Transport user authorization SDDL specified on tunnel-mode rule. |
23409 | The Apply Global Authorisation flag cannot be used when a per-rule authorisation list is also specified. |
The Apply Global Authorization flag cannot be used when a per-rule authorization list is also specified. |
23410 | The transport rule machine SDDL is not valid. |
The transport rule machine SDDL is not valid. |
23411 | The transport rule user SDDL is not valid. |
The transport rule user SDDL is not valid. |
23413 | The phase 2 auth set ID contains invalid characters or is an invalid length. |
The phase 2 auth set ID contains invalid characters, or is an invalid length. |
23414 | The target schema version does not support dynamic endpoints. |
The target schema version does not support dynamic endpoints. |
23415 | When specifying tunnel endpoints in both IPv4 and IPv6, a tunnel endpoint may not be dynamic for one address family and explicit for the other. (A dynamic tunnel endpoint is one set to "Any".) |
When specifying tunnel endpoints in both IPv4 and IPv6, a tunnel endpoint may not be dynamic for one address family and explicit for the other. (A dynamic tunnel endpoint is one set to "Any".) |
23416 | The edge traversal flags are inconsistent. Defer To App must be set without Edge Traversal but Defer To User must be set with Edge Traversal. |
The edge traversal flags are inconsistent. Defer To App must be set without Edge Traversal, but Defer To User must be set with Edge Traversal. |
23417 | The target schema version does not support Authentication (No Encapsulation). |
The target schema version does not support Authentication (No Encapsulation). |
23418 | When the Authentication (No Encapsulation) flag is set, the Authentication flag must also be set. |
When the Authentication (No Encapsulation) flag is set, the Authentication flag must be set as well. |
23419 | The target schema version does not support tunnel authentication modes. |
The target schema version does not support tunnel authentication modes. |
23421 | The target schema version does not support the IP_HTTPS keyword. |
The target schema version does not support the IP_HTTPS keyword. |
23422 | The target schema version does not support the IP_TLS keyword. |
The target schema version does not support the IP_TLS keyword. |
23423 | The target schema version does not support dynamic edge traversal. |
The target schema version does not support dynamic edge traversal. |
23424 | The local user owner SID is invalid. |
The local user owner SID is invalid. |
23425 | The target schema version does not support the local user owner field. |
The target schema version does not support the local user owner field. |
23426 | The target schema version does not support profile crossing. |
The target schema version does not support profile crossing. |
23427 | The target schema version does not support one or more of the address keywords given. |
The target schema version does not support one or more of the address keywords given. |
23428 | The application package SID is invalid. |
The application package SID is invalid. |
23429 | The target schema version does not support application package SIDs. |
The target schema version does not support application package SIDs. |
23430 | Logical endpoints (trust tuples) cannot be combined with specific addresses or ports. |
Logical endpoints (trust tuples) cannot be combined with specific addresses or ports. |
23431 | One or more of the logical endpoints (trust tuples) are invalid. |
One or more of the logical endpoints (trust tuples) are invalid. |
23432 | The target schema version does not support logical endpoints (trust tuples). |
The target schema version does not support logical endpoints (trust tuples). |
23433 | The target schema version does not support the Key Manager Dictation flag. |
The target schema version does not support the Key Manager Dictation flag. |
23434 | The target schema version does not support the Key Manager Notification flag. |
The target schema version does not support the Key Manager Notification flag. |
23435 | The target schema version does not support one or more of the authentication methods given. |
The target schema version does not support one or more of the authentication methods given. |
23436 | The target schema version does not support the requested certificate signing algorithm. |
The target schema version does not support the requested certificate signing algorithm. |
23437 | The target schema version does not support targeting Intermediate CA's. |
The target schema version does not support targeting Intermediate CA's. |
23438 | When specifying multiple certificate authentication proposals, all the certificate proposals with the same signing method must be grouped together within the set. |
When specifying multiple certificate authentication proposals, all the certificate proposals with the same signing method must must be grouped together within the set. |
23439 | The target schema version does not support kerberos proxy servers. |
The target schema version does not support kerberos proxy servers. |
23440 | The main mode crypto set ID should be the global main mode crypto set ID. |
The main mode crypto set ID should be the global main mode crypto set ID. |
23441 | The target schema version does not support one of the main mode encryption algorithms chosen. |
The target schema version does not support one of the main mode encryption algorithms chosen. |
23442 | The target schema version does not support one of the main mode hash algorithms chosen. |
The target schema version does not support one of the main mode hash algorithms chosen. |
23443 | The target schema version does not support one of the main mode key exchange algorithms chosen. |
The target schema version does not support one of the main mode key exchange algorithms chosen. |
23444 | The target schema version does not support one of the quick mode encryption algorithms chosen. |
The target schema version does not support one of the quick mode encryption algorithms chosen. |
23445 | The target schema version does not support one of the quick mode hash algorithms chosen. |
The target schema version does not support one of the quick mode hash algorithms chosen. |
23446 | The target schema version does not support one of the quick mode key exchange algorithms chosen. |
The target schema version does not support one of the quick mode key exchange algorithms chosen. |
23447 | The encryption and hash algorithms specified are incompatible. |
The encryption and hash algorithms specified are incompatible. |
23448 | Malformed query: Mismatch in the number of ORed terms and the terms array |
Malformed query: Mismatch in the number of ORed terms and the terms array |
23449 | Malformed query: Mismatch in the number of ANDed conditions and conditions array |
Malformed query: Mismatch in the number of ANDed conditions and conditions array |
23450 | Malformed query: Invalid condition match key |
Malformed query: Invalid confition match key |
23451 | Malformed query: Invalid condition match type |
Malformed query: Invalid condition match type |
23452 | Malformed query: Invalid condition data type |
Malformed query: Invalid condition data type |
23453 | Malformed query: Invalid key and data type combination |
Malformed query: Invalid key and data type combination |
23454 | Malformed query: Protocol condition present without a protocol condition |
Malformed query: Protocol condition present without a protocol condition |
23455 | Malformed query: Profile Key unavailable for this object type queried |
Malformed query: Profile Key unavailable for this object type queried |
23456 | Malformed query: Status Key unavailable for this object type queried |
Malformed query: Status Key unavailable for this object type queried |
23457 | Malformed query: FilterID Key unavailable for this object type queried |
Malformed query: FilterID Key unavailable for this object type queried |
23458 | Malformed query: Application Key unavailable for this object type queried |
Malformed query: Application Key unavailable for this object type queried |
23459 | Malformed query: Protocol Key unavailable for this object type queried |
Malformed query: Protocol Key unavailable for this object type queried |
23460 | Malformed query: Local Port Key unavailable for this object type queried |
Malformed query: Local Port Key unavailable for this object type queried |
23461 | Malformed query: Remote Port Key unavailable for this object type queried |
Malformed query: Remote Port Key unavailable for this object type queried |
23462 | Malformed query: Service Name Key unavailable for this object type queried |
Malformed query: Service Name Key unavailable for this object type queried |
23463 | Authentication (No Encapsulation) may not be used on tunnel-mode rules. |
Authentication (No Encapsulation) may not be used on tunnel-mode rules. |
23464 | Authentication (No Encapsulation) may not be used on rules that contain pre-shared keys. |
Authentication (No Encapsulation) may not be used on rules that contain preshared keys. |
23465 | A runtime error occurred while trying to enforce the rule. |
A runtime error occurred while trying to enforce the rule. |
23466 | The main mode cryptographic set was not found. |
The main mode cryptographic set was not found. |
23467 | The target schema version does not support local only mapping. |
The target schema version does not support local only mapping. |
23468 | The key module in the rule is incompatible with the authentication methods specified in the associated authentication sets. |
The key module in the rule is incompatible with the authentication methods specified in the associated authentication sets. |
23469 | The target schema version does not support Security Realm flag. |
The target schema version does not support Security Realm flag. |
23470 | Firewall Rules with security realm ID field would require authentication and encryption, and action should be Allow. |
Firewall Rules with security realm Id field would require authentication and encryption, and action should be Allow. |
23471 | A string for the security realm ID is invalid. |
A string for the security realm Id is invalid. |
23472 | The target schema version does not support security realm ID. |
The target schema version does not support security realm Id. |
23473 | The Sytem OS Only and Game OS Only flags cannot be used together. |
The Sytem OS Only and Game OS Only flags cannot be used together. |
23474 | The target schema version does not support specifying System OS or Game OS flag |
The target schema version does not support specifying System OS or Game OS flag |
23475 | The target schema version does not support specifying Development mode flag |
The target schema version does not support specifying Development mode flag |
23476 | A string for the FQBN is invalid. |
A string for the FQBN is invalid. |
23477 | The target schema version does not support specifying fqbn. |
The target schema version does not support specifying fqbn. |
23478 | The target schema version does not support specifying compartment ID. |
The target schema version does not support specifying compartment Id. |
23479 | The target schema version does not support specifying callout and audit flag |
The target schema version does not support specifying callout and audit flag |
23500 | mpssvc |
mpssvc |
23501 | Microsoft Corporation |
Microsoft Corporation |
23502 | Microsoft Windows Firewall Provider |
Microsoft Windows Firewall Provider |
23503 | Windows Firewall Static Session |
Windows Firewall Static Session |
23504 | Windows Firewall Dynamic Session |
Windows Firewall Dynamic Session |
23505 | Boot Time Filter |
Boot Time Filter |
23506 | This filter is in effect before the service starts. |
This filter is in effect before the service starts. |
23507 | Logging Filter |
Logging Filter |
23508 | This filter implements logging, if configured. |
This filter implements logging, if configured. |
23509 | Port Scanning Prevention Filter |
Port Scanning Prevention Filter |
23510 | This filter prevents port scanning. This many times means there are no listeners. If debugging ensure your scenario has one. |
This filter prevents port scanning. This many times means there are no listeners. If debugging ensure your scenario has one. |
23511 | Loopback Permit Filter |
Loopback Permit Filter |
23512 | This filter permits loopback traffic. |
This filter permits loopback traffic. |
23513 | Secondary Connections Filter |
Secondary Connections Filter |
23514 | This filter permits secondary connections for FTP protocols. |
This filter permits secondary connections for FTP protocols. |
23515 | Deep Protocol Inspection Filter |
Deep Protocol Inspection Filter |
23516 | This filter implements deep inspection for FTP protocols. |
This filter implements deep inspection for FTP protocols. |
23517 | FTP Inspection Filter |
FTP Inspection Filter |
23518 | This filter enables inspection of FTP. |
This filter enables inspection of FTP. |
23522 | Microsoft Windows Firewall IPsec Provider |
Microsoft Windows Firewall IPsec Provider |
23523 | State Management Filter |
State Management Filter |
23524 | Indicates different options to WFP to allow customisation of state creation. |
Indicates different options to WFP to allow customization of state creation. |
23525 | State Management Provider Context |
State Management Provider Context |
23526 | Contains State Management Options |
Contains State Management Options |
23527 | Security Realm ID Provider Context |
Security Realm Id Provider Context |
23528 | Contains Security Realm ID |
Contains Security Realm Id |
23529 | Interface to Bind Provider Context |
Interface to Bind Provider Context |
23530 | Contains The Interface ID to Bind to |
Contains The Interface Id to Bind to |
23531 | Policy Silent Mode Provider Context |
Policy Silent Mode Provider Context |
23532 | The policy is inspected only but not enforced |
The poicy is inspected only but not enforced |
23831 | UPnP Framework (TCP-In) |
UPnP Framework (TCP-In) |
23832 | Inbound rule for UPnP Framework traffic [TCP] |
Inbound rule for UPnP Framework traffic [TCP] |
23833 | UPnP Framework (TCP-Out) |
UPnP Framework (TCP-Out) |
23834 | Outbound rule for UPnP Framework traffic [TCP] |
Outbound rule for UPnP Framework traffic [TCP] |
23835 | UPnP Framework (UDP-In) |
UPnP Framework (UDP-In) |
23836 | Inbound rule for UPnP Framework traffic [UDP] |
Inbound rule for UPnP Framework traffic [UDP] |
23837 | UPnP Framework (UDP-Out) |
UPnP Framework (UDP-Out) |
23838 | Outbound rule for UPnP Framework traffic [UDP] |
Outbound rule for UPnP Framework traffic [UDP] |
24000 | Windows Firewall with Advanced Security |
Windows Firewall with Advanced Security |
24001 | Configure policies that provide enhanced network security for Windows computers. |
Configure policies that provide enhanced network security for Windows computers. |
25000 | Core Networking |
Core Networking |
25001 | Core Networking - Packet Too Big (ICMPv6-In) |
Core Networking - Packet Too Big (ICMPv6-In) |
25002 | Core Networking - Packet Too Big (ICMPv6-Out) |
Core Networking - Packet Too Big (ICMPv6-Out) |
25007 | Packet Too Big error messages are sent from any node that a packet traverses which is unable to forward the packet because the packet is too large for the next link. |
Packet Too Big error messages are sent from any node that a packet traverses which is unable to forward the packet because the packet is too large for the next link. |
25008 | Core Networking - Router Solicitation (ICMPv6-Out) |
Core Networking - Router Solicitation (ICMPv6-Out) |
25009 | Core Networking - Router Solicitation (ICMPv6-In) |
Core Networking - Router Solicitation (ICMPv6-In) |
25011 | Router Solicitation messages are sent by nodes seeking routers to provide stateless auto-configuration. |
Router Solicitation messages are sent by nodes seeking routers to provide stateless auto-configuration. |
25012 | Core Networking - Router Advertisement (ICMPv6-In) |
Core Networking - Router Advertisement (ICMPv6-In) |
25013 | Core Networking - Router Advertisement (ICMPv6-Out) |
Core Networking - Router Advertisement (ICMPv6-Out) |
25018 | Router Advertisement messages are sent by routers to other nodes for stateless auto-configuration. |
Router Advertisement messages are sent by routers to other nodes for stateless auto-configuration. |
25019 | Core Networking - Neighbour Discovery Solicitation (ICMPv6-In) |
Core Networking - Neighbor Discovery Solicitation (ICMPv6-In) |
25020 | Core Networking - Neighbour Discovery Solicitation (ICMPv6-Out) |
Core Networking - Neighbor Discovery Solicitation (ICMPv6-Out) |
25025 | Neighbour Discovery Solicitations are sent by nodes to discover the link-layer address of another on-link IPv6 node. |
Neighbor Discovery Solicitations are sent by nodes to discover the link-layer address of another on-link IPv6 node. |
25026 | Core Networking - Neighbour Discovery Advertisement (ICMPv6-In) |
Core Networking - Neighbor Discovery Advertisement (ICMPv6-In) |
25027 | Core Networking - Neighbour Discovery Advertisement (ICMPv6-Out) |
Core Networking - Neighbor Discovery Advertisement (ICMPv6-Out) |
25032 | Neighbour Discovery Advertisement messages are sent by nodes to notify other nodes of link-layer address changes or in response to a Neighbour Discovery Solicitation request. |
Neighbor Discovery Advertisement messages are sent by nodes to notify other nodes of link-layer address changes or in response to a Neighbor Discovery Solicitation request. |
25033 | Core Networking - Inverse Neighbour Discovery Solicitation (ICMPv6-In) |
Core Networking - Inverse Neighbor Discovery Solicitation (ICMPv6-In) |
25034 | Core Networking - Inverse Neighbour Discovery Solicitation (ICMPv6-Out) |
Core Networking - Inverse Neighbor Discovery Solicitation (ICMPv6-Out) |
25039 | Inverse Neighbour Discovery Solicitations are sent by nodes to discover the IP address of another IPv6 node given its link-layer address. |
Inverse Neighbor Discovery Solicitations are sent by nodes to discover the IP address of another IPv6 node given its link-layer address. |
25040 | Core Networking - Inverse Neighbour Discovery Advertisement (ICMPv6-In) |
Core Networking - Inverse Neighbor Discovery Advertisement (ICMPv6-In) |
25041 | Core Networking - Inverse Neighbour Discovery Advertisement (ICMPv6-Out) |
Core Networking - Inverse Neighbor Discovery Advertisement (ICMPv6-Out) |
25046 | Inverse Neighbour Discovery Solicitations are sent by nodes to notify other nodes of IP address changes or in response to an Inverse Neighbour Discovery Solicitation request. |
Inverse Neighbor Discovery Solicitations are sent by nodes to notify other nodes of IP address changes or in response to an Inverse Neighbor Discovery Solicitation request. |
25047 | Core Networking - Certificate Path Solicitation (ICMPv6-In) |
Core Networking - Certificate Path Solicitation (ICMPv6-In) |
25048 | Core Networking - Certificate Path Solicitation (ICMPv6-Out) |
Core Networking - Certificate Path Solicitation (ICMPv6-Out) |
25053 | SEND - Secure Neighbour Discovery - Certificate Path Solicitation is a secure version of Neighbour Discovery Solicitation. |
SEND - Secure Neighbor Discovery - Certificate Path Solicitation is a secure version of Neighbor Discovery Solicitation. |
25054 | Core Networking - Certificate Path Advertisement (ICMPv6-In) |
Core Networking - Certificate Path Advertisement (ICMPv6-In) |
25055 | Core Networking - Certificate Path Advertisement (ICMPv6-Out) |
Core Networking - Certificate Path Advertisement (ICMPv6-Out) |
25060 | SEND - Secure Neighbour Discovery - Certificate Path Advertisement is a secure version of Neighbour Discovery Advertisement. |
SEND - Secure Neighbor Discovery - Certificate Path Advertisement is a secure version of Neighbor Discovery Advertisement. |
25061 | Core Networking - Multicast Listener Query (ICMPv6-In) |
Core Networking - Multicast Listener Query (ICMPv6-In) |
25062 | Core Networking - Multicast Listener Query (ICMPv6-Out) |
Core Networking - Multicast Listener Query (ICMPv6-Out) |
25067 | An IPv6 multicast-capable router uses the Multicast Listener Query message to query a link for multicast group membership. |
An IPv6 multicast-capable router uses the Multicast Listener Query message to query a link for multicast group membership. |
25068 | Core Networking - Multicast Listener Report (ICMPv6-In) |
Core Networking - Multicast Listener Report (ICMPv6-In) |
25069 | Core Networking - Multicast Listener Report (ICMPv6-Out) |
Core Networking - Multicast Listener Report (ICMPv6-Out) |
25074 | The Multicast Listener Report message is used by a listening node to either immediately report its interest in receiving multicast traffic at a specific multicast address or in response to a Multicast Listener Query. |
The Multicast Listener Report message is used by a listening node to either immediately report its interest in receiving multicast traffic at a specific multicast address or in response to a Multicast Listener Query. |
25075 | Core Networking - Multicast Listener Report v2 (ICMPv6-In) |
Core Networking - Multicast Listener Report v2 (ICMPv6-In) |
25076 | Core Networking - Multicast Listener Report v2 (ICMPv6-Out) |
Core Networking - Multicast Listener Report v2 (ICMPv6-Out) |
25081 | Multicast Listener Report v2 message is used by a listening node to either immediately report its interest in receiving multicast traffic at a specific multicast address or in response to a Multicast Listener Query. |
Multicast Listener Report v2 message is used by a listening node to either immediately report its interest in receiving multicast traffic at a specific multicast address or in response to a Multicast Listener Query. |
25082 | Core Networking - Multicast Listener Done (ICMPv6-In) |
Core Networking - Multicast Listener Done (ICMPv6-In) |
25083 | Core Networking - Multicast Listener Done (ICMPv6-Out) |
Core Networking - Multicast Listener Done (ICMPv6-Out) |
25088 | Multicast Listener Done messages inform local routers that there are no longer any members remaining for a specific multicast address on the subnet. |
Multicast Listener Done messages inform local routers that there are no longer any members remaining for a specific multicast address on the subnet. |
25089 | Core Networking - Multicast Router Advertisement (ICMPv6-In) |
Core Networking - Multicast Router Advertisement (ICMPv6-In) |
25090 | Core Networking - Multicast Router Advertisement (ICMPv6-Out) |
Core Networking - Multicast Router Advertisement (ICMPv6-Out) |
25095 | Multicast Router Advertisement messages are sent by routers to advertise that IP multicast forwarding is enabled. |
Multicast Router Advertisement messages are sent by routers to advertise that IP multicast forwarding is enabled. |
25096 | Core Networking - Multicast Router Solicitation (ICMPv6-In) |
Core Networking - Multicast Router Solicitation (ICMPv6-In) |
25097 | Core Networking - Multicast Router Solicitation (ICMPv6-Out) |
Core Networking - Multicast Router Solicitation (ICMPv6-Out) |
25102 | Multicast Router Solicitation messages are sent in order to discover routers with IP multicast forwarding enabled. |
Multicast Router Solicitation messages are sent in order to discover routers with IP multicast forwarding enabled. |
25103 | Core Networking - Multicast Router Termination (ICMPv6-In) |
Core Networking - Multicast Router Termination (ICMPv6-In) |
25104 | Core Networking - Multicast Router Termination (ICMPv6-Out) |
Core Networking - Multicast Router Termination (ICMPv6-Out) |
25109 | Multicast Router Termination messages are sent when a router stops IP multicast routing functions on an interface. |
Multicast Router Termination messages are sent when a router stops IP multicast routing functions on an interface. |
25110 | Core Networking - Destination Unreachable (ICMPv6-In) |
Core Networking - Destination Unreachable (ICMPv6-In) |
25111 | Core Networking - Destination Unreachable (ICMPv6-Out) |
Core Networking - Destination Unreachable (ICMPv6-Out) |
25112 | Destination Unreachable error messages are sent from any node that a packet traverses which is unable to forward the packet for any reason except congestion. |
Destination Unreachable error messages are sent from any node that a packet traverses which is unable to forward the packet for any reason except congestion. |
25113 | Core Networking - Time Exceeded (ICMPv6-In) |
Core Networking - Time Exceeded (ICMPv6-In) |
25114 | Core Networking - Time Exceeded (ICMPv6-Out) |
Core Networking - Time Exceeded (ICMPv6-Out) |
25115 | Time Exceeded error messages are generated from any node that a packet traverses if the Hop Limit value is decremented to zero at any point on the path. |
Time Exceeded error messages are generated from any node that a packet traverses if the Hop Limit value is decremented to zero at any point on the path. |
25116 | Core Networking - Parameter Problem (ICMPv6-In) |
Core Networking - Parameter Problem (ICMPv6-In) |
25117 | Core Networking - Parameter Problem (ICMPv6-Out) |
Core Networking - Parameter Problem (ICMPv6-Out) |
25118 | Parameter Problem error messages are sent by nodes as a result of incorrectly generated packets. |
Parameter Problem error messages are sent by nodes as a result of incorrectly generated packets. |
25251 | Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-In) |
Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-In) |
25252 | Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-Out) |
Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-Out) |
25257 | Destination Unreachable Fragmentation Needed error messages are sent from any node that a packet traverses which is unable to forward the packet because fragmentation was needed and the don't fragment bit was set. |
Destination Unreachable Fragmentation Needed error messages are sent from any node that a packet traverses which is unable to forward the packet because fragmentation was needed and the don’t fragment bit was set. |
25301 | Core Networking - Dynamic Host Configuration Protocol (DHCP-In) |
Core Networking - Dynamic Host Configuration Protocol (DHCP-In) |
25302 | Core Networking - Dynamic Host Configuration Protocol (DHCP-Out) |
Core Networking - Dynamic Host Configuration Protocol (DHCP-Out) |
25303 | Allows DHCP (Dynamic Host Configuration Protocol) messages for stateful auto-configuration. |
Allows DHCP (Dynamic Host Configuration Protocol) messages for stateful auto-configuration. |
25304 | Core Networking - Dynamic Host Configuration Protocol for IPv6(DHCPV6-In) |
Core Networking - Dynamic Host Configuration Protocol for IPv6(DHCPV6-In) |
25305 | Core Networking - Dynamic Host Configuration Protocol for IPv6 (DHCPV6-Out) |
Core Networking - Dynamic Host Configuration Protocol for IPv6(DHCPV6-Out) |
25306 | Allows DHCPV6 (Dynamic Host Configuration Protocol for IPv6) messages for stateful and stateless configuration. |
Allows DHCPV6 (Dynamic Host Configuration Protocol for IPv6) messages for stateful and stateless configuration. |
25326 | Core Networking - Teredo (UDP-In) |
Core Networking - Teredo (UDP-In) |
25327 | Core Networking - Teredo (UDP-Out) |
Core Networking - Teredo (UDP-Out) |
25332 | Inbound UDP rule to allow Teredo edge traversal, a technology that provides address assignment and automatic tunnelling for unicast IPv6 traffic when an IPv6/IPv4 host is located behind an IPv4 network address translator. |
Inbound UDP rule to allow Teredo edge traversal, a technology that provides address assignment and automatic tunneling for unicast IPv6 traffic when an IPv6/IPv4 host is located behind an IPv4 network address translator. |
25333 | Outbound UDP rule to allow Teredo edge traversal, a technology that provides address assignment and automatic tunnelling for unicast IPv6 traffic when an IPv6/IPv4 host is located behind an IPv4 network address translator. |
Outbound UDP rule to allow Teredo edge traversal, a technology that provides address assignment and automatic tunneling for unicast IPv6 traffic when an IPv6/IPv4 host is located behind an IPv4 network address translator. |
25351 | Core Networking - IPv6 (IPv6-In) |
Core Networking - IPv6 (IPv6-In) |
25352 | Core Networking - IPv6 (IPv6-Out) |
Core Networking - IPv6 (IPv6-Out) |
25357 | Inbound rule required to permit IPv6 traffic for ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) and 6to4 tunnelling services. |
Inbound rule required to permit IPv6 traffic for ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) and 6to4 tunneling services. |
25358 | Outbound rule required to permit IPv6 traffic for ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) and 6to4 tunnelling services. |
Outbound rule required to permit IPv6 traffic for ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) and 6to4 tunneling services. |
25376 | Core Networking - Internet Group Management Protocol (IGMP-In) |
Core Networking - Internet Group Management Protocol (IGMP-In) |
25377 | Core Networking - Internet Group Management Protocol (IGMP-Out) |
Core Networking - Internet Group Management Protocol (IGMP-Out) |
25382 | IGMP messages are sent and received by nodes to create, join and depart multicast groups. |
IGMP messages are sent and received by nodes to create, join and depart multicast groups. |
25401 | Core Networking - Group Policy (NP-Out) |
Core Networking - Group Policy (NP-Out) |
25402 | Outbound rule to allow SMB traffic for Group Policy updates. [TCP 445] |
Outbound rule to allow SMB traffic for Group Policy updates. [TCP 445] |
25403 | Core Networking - Group Policy (TCP-Out) |
Core Networking - Group Policy (TCP-Out) |
25404 | Outbound rule to allow remote RPC traffic for Group Policy updates. [TCP] |
Outbound rule to allow remote RPC traffic for Group Policy updates. [TCP] |
25405 | Core Networking - DNS (UDP-Out) |
Core Networking - DNS (UDP-Out) |
25406 | Outbound rule to allow DNS requests. DNS responses based on requests that matched this rule will be permitted regardless of source address. This behaviour is classified as loose source mapping. [LSM] [UDP 53] |
Outbound rule to allow DNS requests. DNS responses based on requests that matched this rule will be permitted regardless of source address. This behavior is classified as loose source mapping. [LSM] [UDP 53] |
25407 | Core Networking - Group Policy (LSASS-Out) |
Core Networking - Group Policy (LSASS-Out) |
25408 | Outbound rule to allow remote LSASS traffic for Group Policy updates [TCP]. |
Outbound rule to allow remote LSASS traffic for Group Policy updates [TCP]. |
25426 | Core Networking - IPHTTPS (TCP-In) |
Core Networking - IPHTTPS (TCP-In) |
25427 | Core Networking - IPHTTPS (TCP-Out) |
Core Networking - IPHTTPS (TCP-Out) |
25428 | Inbound TCP rule to allow IPHTTPS tunnelling technology to provide connectivity across HTTP proxies and firewalls. |
Inbound TCP rule to allow IPHTTPS tunneling technology to provide connectivity across HTTP proxies and firewalls. |
25429 | Outbound TCP rule to allow IPHTTPS tunnelling technology to provide connectivity across HTTP proxies and firewalls. |
Outbound TCP rule to allow IPHTTPS tunneling technology to provide connectivity across HTTP proxies and firewalls. |
26008 | Networking - Destination Unreachable (ICMPv4-In) |
Networking - Destination Unreachable (ICMPv4-In) |
26009 | Networking - Destination Unreachable (ICMPv4-Out) |
Networking - Destination Unreachable (ICMPv4-Out) |
26015 | Networking - Source Quench (ICMPv4-In) |
Networking - Source Quench (ICMPv4-In) |
26016 | Networking - Source Quench (ICMPv4-Out) |
Networking - Source Quench (ICMPv4-Out) |
26021 | Source Quench messages are sent from any node that a packet traverses which discards the datagram because they are arriving too fast or there are buffering issues. |
Source Quench messages are sent from any node that a packet traverses which discards the datagram because they are arriving too fast or there are buffering issues. |
26022 | Networking - Redirect (ICMPv4-In) |
Networking - Redirect (ICMPv4-In) |
26023 | Networking - Redirect (ICMPv4-Out) |
Networking - Redirect (ICMPv4-Out) |
26028 | Redirect messages are sent to indicate that the node which the packet was sent to is no longer the best gateway to reach the network in question. |
Redirect messages are sent to indicate that the node which the packet was sent to is no longer the best gateway to reach the network in question. |
26036 | Networking - Time Exceeded (ICMPv4-In) |
Networking - Time Exceeded (ICMPv4-In) |
26037 | Networking - Time Exceeded (ICMPv4-Out) |
Networking - Time Exceeded (ICMPv4-Out) |
26042 | Time Exceeded error messages are generated from any node which a packet traverses if the Hop Limit value is decremented to zero at any point on the path. |
Time Exceeded error messages are generated from any node which a packet traverses if the Hop Limit value is decremented to zero at any point on the path. |
26043 | Networking - Timestamp Request (ICMPv4-In) |
Networking - Timestamp Request (ICMPv4-In) |
26044 | Networking - Timestamp Request (ICMPv4-Out) |
Networking - Timestamp Request (ICMPv4-Out) |
26049 | Timestamp Request messages are sent by nodes who wish to obtain the current timestamp from another node. |
Timestamp Request messages are sent by nodes who wish to obtain the current timestamp from another node. |
26057 | Networking - Parameter Problem (ICMPv4-In) |
Networking - Parameter Problem (ICMPv4-In) |
26058 | Networking - Parameter Problem (ICMPv4-Out) |
Networking - Parameter Problem (ICMPv4-Out) |
26078 | Networking - Redirect (ICMPv6-In) |
Networking - Redirect (ICMPv6-In) |
26079 | Networking - Redirect (ICMPv6-Out) |
Networking - Redirect (ICMPv6-Out) |
26106 | Networking - Router Solicitation (ICMPv6-In) |
Networking - Router Solicitation (ICMPv6-In) |
26117 | Networking - Generic Routing Encapsulation (GRE-In) |
Networking - Generic Routing Encapsulation (GRE-In) |
26118 | Networking - Generic Routing Encapsulation (GRE-Out) |
Networking - Generic Routing Encapsulation (GRE-Out) |
26123 | Generic Routing Encapsulation is used for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. |
Generic Routing Encapsulation is used for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. |
26124 | Networking - PGM Reliable Transport Protocol (PGM-In) |
Networking - PGM Reliable Transport Protocol (PGM-In) |
26125 | Networking - PGM Reliable Transport Protocol (PGM-Out) |
Networking - PGM Reliable Transport Protocol (PGM-Out) |
26130 | Pragmatic General Multicast is a reliable multicast transport protocol used for applications that require ordered or unordered, duplicate-free, multicast data delivery from multiple sources to multiple receivers. |
Pragmatic General Multicast is a reliable multicast transport protocol used for applications that require ordered or unordered, duplicate-free, multicast data delivery from multiple sources to multiple receivers. |
26131 | Networking - Packet Too Big (ICMPv4-In) |
Networking - Packet Too Big (ICMPv4-In) |
26132 | Networking - Packet Too Big (ICMPv4-Out) |
Networking - Packet Too Big (ICMPv4-Out) |
26134 | Networking - Router Solicitation (ICMPv4-In) |
Networking - Router Solicitation (ICMPv4-In) |
26135 | Networking - Router Solicitation (ICMPv4-Out) |
Networking - Router Solicitation (ICMPv4-Out) |
26137 | Networking - Address Mask Request (ICMPv4-In) |
Networking - Address Mask Request (ICMPv4-In) |
26138 | Networking - Address Mask Request (ICMPv4-Out) |
Networking - Address Mask Request (ICMPv4-Out) |
26139 | Address Mask Request messages are sent by nodes who wish to obtain the subnet mask for their assigned address. |
Address Mask Request messages are sent by nodes who wish to obtain the subnet mask for their assigned address. |
26140 | Networking - Echo Request (ICMPv4-In) |
Networking - Echo Request (ICMPv4-In) |
26141 | Networking - Echo Request (ICMPv4-Out) |
Networking - Echo Request (ICMPv4-Out) |
26142 | Networking - Echo Request (ICMPv6-In) |
Networking - Echo Request (ICMPv6-In) |
26143 | Networking - Echo Request (ICMPv6-Out) |
Networking - Echo Request (ICMPv6-Out) |
26144 | Echo Request messages are sent as ping requests to other nodes. |
Echo Request messages are sent as ping requests to other nodes. |
28002 | Key Management Service |
Key Management Service |
28003 | Key Management Service (TCP-In) |
Key Management Service (TCP-In) |
28006 | Inbound rule for the Key Management Service to allow for machine counting and licence compliance. [TCP 1688] |
Inbound rule for the Key Management Service to allow for machine counting and license compliance. [TCP 1688] |
28252 | BITS Peercaching |
BITS Peercaching |
28254 | BITS Peercaching (WSD-In) |
BITS Peercaching (WSD-In) |
28257 | Inbound rule for BITS Peercaching to discover neighbours who may have content via WSDAPI. [UDP 3702] |
Inbound rule for BITS Peercaching to discover neighbors who may have content via WSDAPI. [UDP 3702] |
28258 | BITS Peercaching (WSD-Out) |
BITS Peercaching (WSD-Out) |
28261 | Outbound rule for BITS Peercaching to discover neighbours who may have content via WSDAPI. [UDP 3702] |
Outbound rule for BITS Peercaching to discover neighbors who may have content via WSDAPI. [UDP 3702] |
28262 | BITS Peercaching (Content-In) |
BITS Peercaching (Content-In) |
28265 | Inbound rule for BITS Peercaching content transfer port. [TCP 2178] |
Inbound rule for BITS Peercaching content transfer port. [TCP 2178] |
28266 | BITS Peercaching (Content-Out) |
BITS Peercaching (Content-Out) |
28269 | Outbound rule for BITS Peercaching content transfer port. [TCP 2178] |
Outbound rule for BITS Peercaching content transfer port. [TCP 2178] |
28270 | BITS Peercaching (RPC) |
BITS Peercaching (RPC) |
28273 | Inbound rule for the Peercaching authorisation exchange port via dynamic RPC/TCP. |
Inbound rule for the Peercaching authorization exchange port via dynamic RPC/TCP. |
28274 | BITS Peercaching (RPC-EPMAP) |
BITS Peercaching (RPC-EPMAP) |
28277 | Inbound rule for the RPCSS service in order to allow RPC/TCP traffic for BITS Peercaching. |
Inbound rule for the RPCSS service in order to allow RPC/TCP traffic for BITS Peercaching. |
28503 | File and Printer Sharing (NB-Session-In) |
File and Printer Sharing (NB-Session-In) |
28506 | Inbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139] |
Inbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139] |
28507 | File and Printer Sharing (NB-Session-Out) |
File and Printer Sharing (NB-Session-Out) |
28510 | Outbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139] |
Outbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139] |
28511 | File and Printer Sharing (SMB-In) |
File and Printer Sharing (SMB-In) |
28514 | Inbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP 445] |
Inbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP 445] |
28515 | File and Printer Sharing (SMB-Out) |
File and Printer Sharing (SMB-Out) |
28518 | Outbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP 445] |
Outbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP 445] |
28519 | File and Printer Sharing (NB-Name-In) |
File and Printer Sharing (NB-Name-In) |
28522 | Inbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137] |
Inbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137] |
28523 | File and Printer Sharing (NB-Name-Out) |
File and Printer Sharing (NB-Name-Out) |
28526 | Outbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137] |
Outbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137] |
28527 | File and Printer Sharing (NB-Datagram-In) |
File and Printer Sharing (NB-Datagram-In) |
28530 | Inbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP 138] |
Inbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP 138] |
28531 | File and Printer Sharing (NB-Datagram-Out) |
File and Printer Sharing (NB-Datagram-Out) |
28534 | Outbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP 138] |
Outbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP 138] |
28535 | File and Printer Sharing (Spooler Service - RPC) |
File and Printer Sharing (Spooler Service - RPC) |
28538 | Inbound rule for File and Printer Sharing to allow the Print Spooler Service to communicate via TCP/RPC. |
Inbound rule for File and Printer Sharing to allow the Print Spooler Service to communicate via TCP/RPC. |
28539 | File and Printer Sharing (Spooler Service - RPC-EPMAP) |
File and Printer Sharing (Spooler Service - RPC-EPMAP) |
28542 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Spooler Service. |
Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Spooler Service. |
28543 | File and Printer Sharing (Echo Request - ICMPv4-In) |
File and Printer Sharing (Echo Request - ICMPv4-In) |
28544 | File and Printer Sharing (Echo Request - ICMPv4-Out) |
File and Printer Sharing (Echo Request - ICMPv4-Out) |
28545 | File and Printer Sharing (Echo Request - ICMPv6-In) |
File and Printer Sharing (Echo Request - ICMPv6-In) |
28546 | File and Printer Sharing (Echo Request - ICMPv6-Out) |
File and Printer Sharing (Echo Request - ICMPv6-Out) |
28548 | File and Printer Sharing (LLMNR-UDP-In) |
File and Printer Sharing (LLMNR-UDP-In) |
28549 | Inbound rule for File and Printer Sharing to allow Link Local Multicast Name Resolution. [UDP 5355] |
Inbound rule for File and Printer Sharing to allow Link Local Multicast Name Resolution. [UDP 5355] |
28550 | File and Printer Sharing (LLMNR-UDP-Out) |
File and Printer Sharing (LLMNR-UDP-Out) |
28551 | Outbound rule for File and Printer Sharing to allow Link Local Multicast Name Resolution. [UDP 5355] |
Outbound rule for File and Printer Sharing to allow Link Local Multicast Name Resolution. [UDP 5355] |
28602 | File and Printer Sharing over SMBDirect |
File and Printer Sharing over SMBDirect |
28603 | File and Printer Sharing over SMBDirect (iWARP-In) |
File and Printer Sharing over SMBDirect (iWARP-In) |
28606 | Inbound rule for File and Printer Sharing over SMBDirect to allow iWARP [TCP 5445] |
Inbound rule for File and Printer Sharing over SMBDirect to allow iWARP [TCP 5445] |
28753 | Remote Desktop (TCP-In) |
Remote Desktop (TCP-In) |
28756 | Inbound rule for the Remote Desktop service to allow RDP traffic. [TCP 3389] |
Inbound rule for the Remote Desktop service to allow RDP traffic. [TCP 3389] |
28757 | RemoteApp and Desktop Connection Management - WMI (TCP-In) |
RemoteApp and Desktop Connection Management - WMI (TCP-In) |
28758 | Inbound rule for WMI management of RemoteApp and Desktop Connection Management |
Inbound rule for WMI management of RemoteApp and Desktop Connection Management |
28759 | RemoteApp and Desktop Connection Management - WMI (DCOM-In) |
RemoteApp and Desktop Connection Management - WMI (DCOM-In) |
28760 | Inbound rule to allow DCOM traffic for remote WMI management of RemoteApp and Desktop Connection Management. [TCP 135] |
Inbound rule to allow DCOM traffic for remote WMI management of RemoteApp and Desktop Connection Management. [TCP 135] |
28761 | RemoteApp and Desktop Connection Management - WMI (TCP-Out) |
RemoteApp and Desktop Connection Management - WMI (TCP-Out) |
28762 | Outbound rule for WMI management of RemoteApp and Desktop Connection Management |
Outbound rule for WMI management of RemoteApp and Desktop Connection Management |
28763 | RemoteApp and Desktop Connection Management - WMI (Async-TCP-In) |
RemoteApp and Desktop Connection Management - WMI (Async-TCP-In) |
28764 | Inbound rule for asynchronous WMI management of RemoteApp and Desktop Connection Management |
Inbound rule for asynchronous WMI management of RemoteApp and Desktop Connection Management |
28765 | RemoteApp and Desktop Connection Management (RPC) |
RemoteApp and Desktop Connection Management (RPC) |
28766 | Inbound rule to allow RemoteApp and Desktop Connection Management to be remotely managed via RPC/TCP traffic |
Inbound rule to allow RemoteApp and Desktop Connection Management to be remotely managed via RPC/TCP traffic |
28767 | Remote Desktop Web Access - WMI (Async-TCP-In) |
Remote Desktop Web Access - WMI (Async-TCP-In) |
28768 | Inbound rule for asynchronous WMI management of Remote Desktop Web Access |
Inbound rule for asynchronous WMI management of Remote Desktop Web Access |
28769 | Remote Desktop Web Access - WMI (DCOM-In) |
Remote Desktop Web Access - WMI (DCOM-In) |
28770 | Inbound rule to allow DCOM traffic for remote WMI management of Remote Desktop Web Access |
Inbound rule to allow DCOM traffic for remote WMI management of Remote Desktop Web Access |
28771 | Remote Desktop Web Access - WMI (TCP-In) |
Remote Desktop Web Access - WMI (TCP-In) |
28772 | Inbound rule for WMI management of Remote Desktop Web Access |
Inbound rule for WMI management of Remote Desktop Web Access |
28773 | Remote Desktop Web Access - WMI (TCP-Out) |
Remote Desktop Web Access - WMI (TCP-Out) |
28774 | Outbound rule for WMI management of Remote Desktop Web Access |
Outbound rule for WMI management of Remote Desktop Web Access |
28775 | Remote Desktop - User Mode (TCP-In) |
Remote Desktop - User Mode (TCP-In) |
28776 | Remote Desktop - User Mode (UDP-In) |
Remote Desktop - User Mode (UDP-In) |
28777 | Inbound rule for the Remote Desktop service to allow RDP traffic. [UDP 3389] |
Inbound rule for the Remote Desktop service to allow RDP traffic. [UDP 3389] |
28778 | Remote Desktop - Shadow (TCP-In) |
Remote Desktop - Shadow (TCP-In) |
28779 | Inbound rule for the Remote Desktop service to allow shadowing of an existing Remote Desktop session. (TCP-In) |
Inbound rule for the Remote Desktop service to allow shadowing of an existing Remote Desktop session. (TCP-In) |
29002 | iSCSI Service |
iSCSI Service |
29003 | iSCSI Service (TCP-In) |
iSCSI Service (TCP-In) |
29006 | Inbound rule for the iSCSI Service to allow communications with an iSCSI server or device. [TCP] |
Inbound rule for the iSCSI Service to allow communications with an iSCSI server or device. [TCP] |
29007 | iSCSI Service (TCP-Out) |
iSCSI Service (TCP-Out) |
29010 | Outbound rule for the iSCSI Service to allow communications with an iSCSI server or device. [TCP] |
Outbound rule for the iSCSI Service to allow communications with an iSCSI server or device. [TCP] |
29252 | Remote Event Log Management |
Remote Event Log Management |
29253 | Remote Event Log Management (RPC) |
Remote Event Log Management (RPC) |
29256 | Inbound rule for the local Event Log service to be remotely managed via RPC/TCP. |
Inbound rule for the local Event Log service to be remotely managed via RPC/TCP. |
29257 | Remote Event Log Management (NP-In) |
Remote Event Log Management (NP-In) |
29260 | Inbound rule for the local Event Log service to be remotely managed over Named Pipes. |
Inbound rule for the local Event Log service to be remotely managed over Named Pipes. |
29265 | Remote Event Log Management (RPC-EPMAP) |
Remote Event Log Management (RPC-EPMAP) |
29268 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for the local Event Log Service. |
Inbound rule for the RPCSS service to allow RPC/TCP traffic for the local Event Log Service. |
29502 | Remote Service Management |
Remote Service Management |
29503 | Remote Service Management (RPC) |
Remote Service Management (RPC) |
29506 | Inbound rule for the local Service Control Manager to be remotely managed via RPC/TCP. |
Inbound rule for the local Service Control Manager to be remotely managed via RPC/TCP. |
29507 | Remote Service Management (NP-In) |
Remote Service Management (NP-In) |
29510 | Inbound rule for the local Service Control Manager to be remotely managed over Named Pipes. |
Inbound rule for the local Service Control Manager to be remotely managed over Named Pipes. |
29515 | Remote Service Management (RPC-EPMAP) |
Remote Service Management (RPC-EPMAP) |
29518 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for the local Service Control Manager. |
Inbound rule for the RPCSS service to allow RPC/TCP traffic for the local Service Control Manager. |
29752 | Remote Administration |
Remote Administration |
29753 | Remote Administration (RPC) |
Remote Administration (RPC) |
29756 | Inbound rule for all services to be remotely managed via RPC/TCP. |
Inbound rule for all services to be remotely managed via RPC/TCP. |
29757 | Remote Administration (NP-In) |
Remote Administration (NP-In) |
29760 | Inbound rule for all services to be remotely managed over Named Pipes. |
Inbound rule for all services to be remotely managed over Named Pipes. |
29765 | Remote Administration (RPC-EPMAP) |
Remote Administration (RPC-EPMAP) |
29768 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for all the local services. |
Inbound rule for the RPCSS service to allow RPC/TCP traffic for all the local services. |
30002 | Windows Firewall Remote Management |
Windows Firewall Remote Management |
30003 | Windows Firewall Remote Management (RPC) |
Windows Firewall Remote Management (RPC) |
30006 | Inbound rule for the Windows Firewall to be remotely managed via RPC/TCP. |
Inbound rule for the Windows Firewall to be remotely managed via RPC/TCP. |
30007 | Windows Firewall Remote Management (RPC-EPMAP) |
Windows Firewall Remote Management (RPC-EPMAP) |
30010 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Windows Firewall. |
Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Windows Firewall. |
30252 | Windows Remote Management (Compatibility) |
Windows Remote Management (Compatibility) |
30253 | Windows Remote Management (HTTP-In) |
Windows Remote Management (HTTP-In) |
30256 | Inbound rule for Windows Remote Management via WS-Management. [TCP 5985] |
Inbound rule for Windows Remote Management via WS-Management. [TCP 5985] |
30267 | Windows Remote Management |
Windows Remote Management |
30502 | Wireless Portable Devices |
Wireless Portable Devices |
30503 | Wireless Portable Devices (TCP-Out) |
Wireless Portable Devices (TCP-Out) |
30506 | Outbound rule for Wireless Portable Devices to allow use of the Usermode Driver Framework. [TCP] |
Outbound rule for Wireless Portable Devices to allow use of the Usermode Driver Framework. [TCP] |
30507 | Wireless Portable Devices (SSDP-In) |
Wireless Portable Devices (SSDP-In) |
30510 | Inbound rule for Wireless Portable Devices to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Inbound rule for Wireless Portable Devices to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
30511 | Wireless Portable Devices (SSDP-Out) |
Wireless Portable Devices (SSDP-Out) |
30514 | Outbound rule for Wireless Portable Devices to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Outbound rule for Wireless Portable Devices to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
30515 | Wireless Portable Devices (UPnP-In) |
Wireless Portable Devices (UPnP-In) |
30518 | Inbound rule for Wireless Portable Devices to allow use of Universal Plug and Play. [TCP 2869] |
Inbound rule for Wireless Portable Devices to allow use of Universal Plug and Play. [TCP 2869] |
30519 | Wireless Portable Devices (UPnP-Out) |
Wireless Portable Devices (UPnP-Out) |
30522 | Outbound rule for Wireless Portable Devices to allow use of Universal Plug and Play. [TCP] |
Outbound rule for Wireless Portable Devices to allow use of Universal Plug and Play. [TCP] |
30523 | Wireless Portable Devices (UPnPHost-Out) |
Wireless Portable Devices (UPnPHost-Out) |
30752 | Media Center Extenders |
Media Center Extenders |
30753 | Media Center Extenders - SSDP (UDP-In) |
Media Center Extenders - SSDP (UDP-In) |
30756 | Inbound rule for Media Center Extenders to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Inbound rule for Media Center Extenders to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
30757 | Media Center Extenders - SSDP (UDP-Out) |
Media Center Extenders - SSDP (UDP-Out) |
30760 | Outbound rule for Media Center Extenders to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Outbound rule for Media Center Extenders to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
30761 | Media Center Extenders - RTSP (TCP-In) |
Media Center Extenders - RTSP (TCP-In) |
30764 | Inbound rule for Media Center Extenders to allow RTSP AV Control. [TCP 554, TCP 8554-8558] |
Inbound rule for Media Center Extenders to allow RTSP AV Control. [TCP 554, TCP 8554-8558] |
30765 | Media Center Extenders - RTSP (TCP-Out) |
Media Center Extenders - RTSP (TCP-Out) |
30768 | Outbound rule for Media Center Extenders to allow WMDRM-ND and RTSP AV Control. [TCP] |
Outbound rule for Media Center Extenders to allow WMDRM-ND and RTSP AV Control. [TCP] |
30769 | Media Center Extenders - qWave (UDP-In) |
Media Center Extenders - qWave (UDP-In) |
30772 | Inbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
Inbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
30773 | Media Center Extenders - qWave (UDP-Out) |
Media Center Extenders - qWave (UDP-Out) |
30776 | Outbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
Outbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
30777 | Media Center Extenders - qWave (TCP-In) |
Media Center Extenders - qWave (TCP-In) |
30780 | Inbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
Inbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
30781 | Media Center Extenders - qWave (TCP-Out) |
Media Center Extenders - qWave (TCP-Out) |
30784 | Outbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
Outbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
30785 | Media Center Extenders - HTTP Streaming (TCP-In) |
Media Center Extenders - HTTP Streaming (TCP-In) |
30788 | Inbound rule for Media Center Extenders to allow HTTP Media Streaming. [TCP 10244] |
Inbound rule for Media Center Extenders to allow HTTP Media Streaming. [TCP 10244] |
30793 | Media Center Extenders - XSP (TCP-In) |
Media Center Extenders - XSP (TCP-In) |
30796 | Inbound rule for Media Center Extenders to allow terminal sessions. [TCP 3390] |
Inbound rule for Media Center Extenders to allow terminal sessions. [TCP 3390] |
30801 | Media Center Extenders - WMDRM-ND/RTP/RTCP (UDP-In) |
Media Center Extenders - WMDRM-ND/RTP/RTCP (UDP-In) |
30804 | Inbound rule for Media Center Extenders to allow WMDRM-ND and RTP/RTCP AV Streaming. [UDP 7777-7781, UDP 5004-5005, UDP 50004-50013] |
Inbound rule for Media Center Extenders to allow WMDRM-ND and RTP/RTCP AV Streaming. [UDP 7777-7781, UDP 5004-5005, UDP 50004-50013] |
30805 | Media Center Extenders - WMDRM-ND/RTP/RTCP (UDP-Out) |
Media Center Extenders - WMDRM-ND/RTP/RTCP (UDP-Out) |
30808 | Outbound rule for Media Center Extenders to allow WMDRM-ND and RTP/RTCP AV Streaming. [UDP] |
Outbound rule for Media Center Extenders to allow WMDRM-ND and RTP/RTCP AV Streaming. [UDP] |
30810 | Media Center Extenders - Service (TCP-Out) |
Media Center Extenders - Service (TCP-Out) |
30811 | Outbound rule for Media Center Extenders to allow extender devices to locate and connect to the computer. [TCP] |
Outbound rule for Media Center Extenders to allow extender devices to locate and connect to the computer. [TCP] |
30812 | Media Center Extenders - Device Provisioning (TCP-Out) |
Media Center Extenders - Device Provisioning (TCP-Out) |
30813 | Outbound rule for Media Center Extenders to allow traffic for Device Provisioning. [TCP] |
Outbound rule for Media Center Extenders to allow traffic for Device Provisioning. [TCP] |
30814 | Media Center Extenders - Media Streaming (TCP-In) |
Media Center Extenders - Media Streaming (TCP-In) |
30815 | Inbound rule for Media Center Extenders to allow UPnP traffic for Media Streaming. [TCP 2869] |
Inbound rule for Media Center Extenders to allow UPnP traffic for Media Streaming. [TCP 2869] |
30816 | Media Center Extenders - Media Streaming (TCP-Out) |
Media Center Extenders - Media Streaming (TCP-Out) |
30817 | Outbound rule for Media Center Extenders to allow UPnP traffic for Media Streaming. [TCP] |
Outbound rule for Media Center Extenders to allow UPnP traffic for Media Streaming. [TCP] |
30818 | Media Center Extenders - Device Validation (TCP-Out) |
Media Center Extenders - Device Validation (TCP-Out) |
30819 | Outbound rule for Media Center Extenders to allow traffic for Device Validation. [TCP] |
Outbound rule for Media Center Extenders to allow traffic for Device Validation. [TCP] |
30820 | Media Center Extenders - Media Streaming (UDP-Out) |
Media Center Extenders - Media Streaming (UDP-Out) |
30821 | Outbound rule for Media Center Extenders to allow Media Streaming devices to respond to an SSDP search. [UDP 1900] |
Outbound rule for Media Center Extenders to allow Media Streaming devices to respond to an SSDP search. [UDP 1900] |
30822 | Media Center Extenders - UPnP (TCP-Out) |
Media Center Extenders - UPnP (TCP-Out) |
30823 | Outbound rule for Media Center Extenders to allow UPnP devices to transmit device information. [TCP] |
Outbound rule for Media Center Extenders to allow UPnP devices to transmit device information. [TCP] |
31002 | Windows Media Player |
Windows Media Player |
31003 | Windows Media Player (UDP-In) |
Windows Media Player (UDP-In) |
31006 | Inbound rule for Windows Media Player to allow UDP Media Streaming. [UDP] |
Inbound rule for Windows Media Player to allow UDP Media Streaming. [UDP] |
31007 | Windows Media Player (UDP-Out) |
Windows Media Player (UDP-Out) |
31010 | Outbound rule for Windows Media Player to allow UDP Media Streaming. [UDP] |
Outbound rule for Windows Media Player to allow UDP Media Streaming. [UDP] |
31011 | Windows Media Player (TCP-Out) |
Windows Media Player (TCP-Out) |
31014 | Outbound rule for Windows Media Player to allow TCP/HTTP Media Streaming. [TCP] |
Outbound rule for Windows Media Player to allow TCP/HTTP Media Streaming. [TCP] |
31015 | Windows Media Player - Internet Group Management Protocol (IGMP-In) |
Windows Media Player - Internet Group Management Protocol (IGMP-In) |
31018 | Inbound rule for Windows Media Player to allow IGMP messages. |
Inbound rule for Windows Media Player to allow IGMP messages. |
31019 | Windows Media Player - Internet Group Management Protocol (IGMP-Out) |
Windows Media Player - Internet Group Management Protocol (IGMP-Out) |
31022 | Outbound rule for Windows Media Player to allow IGMP messages. |
Outbound rule for Windows Media Player to allow IGMP messages. |
31023 | Windows Media Player x86 (UDP-In) |
Windows Media Player x86 (UDP-In) |
31024 | Windows Media Player x86 (UDP-Out) |
Windows Media Player x86 (UDP-Out) |
31025 | Windows Media Player x86 (TCP-Out) |
Windows Media Player x86 (TCP-Out) |
31252 | Windows Media Player Network Sharing Service |
Windows Media Player Network Sharing Service |
31253 | Windows Media Player Network Sharing Service (qWave-UDP-In) |
Windows Media Player Network Sharing Service (qWave-UDP-In) |
31256 | Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
31257 | Windows Media Player Network Sharing Service (qWave-UDP-Out) |
Windows Media Player Network Sharing Service (qWave-UDP-Out) |
31260 | Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
31261 | Windows Media Player Network Sharing Service (qWave-TCP-In) |
Windows Media Player Network Sharing Service (qWave-TCP-In) |
31264 | Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
31265 | Windows Media Player Network Sharing Service (qWave-TCP-Out) |
Windows Media Player Network Sharing Service (qWave-TCP-Out) |
31268 | Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
31269 | Windows Media Player Network Sharing Service (SSDP-In) |
Windows Media Player Network Sharing Service (SSDP-In) |
31272 | Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
31273 | Windows Media Player Network Sharing Service (SSDP-Out) |
Windows Media Player Network Sharing Service (SSDP-Out) |
31276 | Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
31277 | Windows Media Player Network Sharing Service (UPnP-In) |
Windows Media Player Network Sharing Service (UPnP-In) |
31280 | Inbound rule for the Windows Media Player Network Sharing Service to allow use of Universal Plug and Play. [TCP 2869] |
Inbound rule for the Windows Media Player Network Sharing Service to allow use of Universal Plug and Play. [TCP 2869] |
31281 | Windows Media Player Network Sharing Service (UPnP-Out) |
Windows Media Player Network Sharing Service (UPnP-Out) |
31284 | Outbound rule for the Windows Media Player Network Sharing Service to allow use of Universal Plug and Play. [TCP] |
Outbound rule for the Windows Media Player Network Sharing Service to allow use of Universal Plug and Play. [TCP] |
31285 | Windows Media Player Network Sharing Service (HTTP-Streaming-In) |
Windows Media Player Network Sharing Service (HTTP-Streaming-In) |
31288 | Inbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10243] |
Inbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10243] |
31289 | Windows Media Player Network Sharing Service (HTTP-Streaming-Out) |
Windows Media Player Network Sharing Service (HTTP-Streaming-Out) |
31292 | Outbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10243] |
Outbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10243] |
31293 | Windows Media Player Network Sharing Service (Streaming-UDP-In) |
Windows Media Player Network Sharing Service (Streaming-UDP-In) |
31297 | Windows Media Player Network Sharing Service (Streaming-UDP-Out) |
Windows Media Player Network Sharing Service (Streaming-UDP-Out) |
31301 | Windows Media Player Network Sharing Service (Streaming-TCP-Out) |
Windows Media Player Network Sharing Service (Streaming-TCP-Out) |
31305 | Windows Media Player Network Sharing Service (UDP-In) |
Windows Media Player Network Sharing Service (UDP-In) |
31308 | Inbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [UDP] |
Inbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [UDP] |
31309 | Windows Media Player Network Sharing Service (UDP-Out) |
Windows Media Player Network Sharing Service (UDP-Out) |
31312 | Outbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [UDP] |
Outbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [UDP] |
31313 | Windows Media Player Network Sharing Service (TCP-In) |
Windows Media Player Network Sharing Service (TCP-In) |
31316 | Inbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [TCP] |
Inbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [TCP] |
31317 | Windows Media Player Network Sharing Service (TCP-Out) |
Windows Media Player Network Sharing Service (TCP-Out) |
31320 | Outbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [TCP] |
Outbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [TCP] |
31321 | Windows Media Player Network Sharing Service (UPnPHost-Out) |
Windows Media Player Network Sharing Service (UPnPHost-Out) |
31323 | Windows Media Player Network Sharing Service x86 (Streaming-UDP-In) |
Windows Media Player Network Sharing Service x86 (Streaming-UDP-In) |
31324 | Windows Media Player Network Sharing Service x86 (Streaming-UDP-Out) |
Windows Media Player Network Sharing Service x86 (Streaming-UDP-Out) |
31325 | Windows Media Player Network Sharing Service x86 (Streaming-TCP-Out) |
Windows Media Player Network Sharing Service x86 (Streaming-TCP-Out) |
31500 | Windows Media Player Network Sharing Service (Internet) |
Windows Media Player Network Sharing Service (Internet) |
31502 | Inbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10245] |
Inbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10245] |
31700 | Windows Media Player Network Sharing Service service hardening - RTSP |
Windows Media Player Network Sharing Service service hardening - RTSP |
31701 | Allow incoming RTSP connections to the Windows Media Player Network Sharing Service |
Allow incoming RTSP connections to the Windows Media Player Network Sharing Service |
31702 | Windows Media Player Network Sharing Service service hardening - Block any other incoming TCP traffic |
Windows Media Player Network Sharing Service service hardening - Block any other incoming TCP traffic |
31752 | Connect to a Network Projector |
Connect to a Network Projector |
31753 | Connect to a Network Projector (WSD-In) |
Connect to a Network Projector (WSD-In) |
31756 | Inbound rule for Connect to a Network Projector to discover devices via WSDAPI. [UDP 3702] |
Inbound rule for Connect to a Network Projector to discover devices via WSDAPI. [UDP 3702] |
31757 | Connect to a Network Projector (WSD-Out) |
Connect to a Network Projector (WSD-Out) |
31760 | Outbound rule for Connect to a Network Projector to discover devices via WSDAPI. [UDP 3702] |
Outbound rule for Connect to a Network Projector to discover devices via WSDAPI. [UDP 3702] |
31761 | Connect to a Network Projector (TCP-In) |
Connect to a Network Projector (TCP-In) |
31764 | Inbound rule for Connect to a Network Projector to communicate with devices on the network. [TCP] |
Inbound rule for Connect to a Network Projector to communicate with devices on the network. [TCP] |
31765 | Connect to a Network Projector (TCP-Out) |
Connect to a Network Projector (TCP-Out) |
31768 | Outbound rule for Connect to a Network Projector to communicate with devices on the network. [TCP] |
Outbound rule for Connect to a Network Projector to communicate with devices on the network. [TCP] |
31769 | Connect to a Network Projector (WSD Events-In) |
Connect to a Network Projector (WSD Events-In) |
31770 | Inbound rule for Connect to a Network Projector to allow WSDAPI Events Discovery. [TCP 5357] |
Inbound rule for Connect to a Network Projector to allow WSDAPI Events Discovery. [TCP 5357] |
31771 | Connect to a Network Projector (WSD Events-Out) |
Connect to a Network Projector (WSD Events-Out) |
31772 | Outbound rule for Connect to a Network Projector to allow WSDAPI Events Discovery. [TCP 5358] |
Outbound rule for Connect to a Network Projector to allow WSDAPI Events Discovery. [TCP 5358] |
31773 | Connect to a Network Projector (WSD EventsSecure-In) |
Connect to a Network Projector (WSD EventsSecure-In) |
31774 | Inbound rule for Connect to a Network Projector to allow Secure WSDAPI Events. [TCP 5358] |
Inbound rule for Connect to a Network Projector to allow Secure WSDAPI Events. [TCP 5358] |
31775 | Connect to a Network Projector (WSD EventsSecure-Out) |
Connect to a Network Projector (WSD EventsSecure-Out) |
31776 | Outbound rule for Connect to a Network Projector to allow Secure WSDAPI Events. [TCP 5358] |
Outbound rule for Connect to a Network Projector to allow Secure WSDAPI Events. [TCP 5358] |
32002 | Windows Peer to Peer Collaboration Foundation |
Windows Peer to Peer Collaboration Foundation |
32003 | Windows Peer to Peer Collaboration Foundation (TCP-In) |
Windows Peer to Peer Collaboration Foundation (TCP-In) |
32006 | Inbound rule for the Windows Peer to Peer Collaboration Foundation for Peer to Peer Communication. [TCP] |
Inbound rule for the Windows Peer to Peer Collaboration Foundation for Peer to Peer Communication. [TCP] |
32007 | Windows Peer to Peer Collaboration Foundation (TCP-Out) |
Windows Peer to Peer Collaboration Foundation (TCP-Out) |
32010 | Outbound rule for the Windows Peer to Peer Collaboration Foundation for Peer to Peer Communication. [TCP] |
Outbound rule for the Windows Peer to Peer Collaboration Foundation for Peer to Peer Communication. [TCP] |
32011 | Windows Peer to Peer Collaboration Foundation (WSD-In) |
Windows Peer to Peer Collaboration Foundation (WSD-In) |
32014 | Inbound rule for the Windows Peer to Peer Collaboration Foundation to discover devices via WSDAPI. [UDP 3702] |
Inbound rule for the Windows Peer to Peer Collaboration Foundation to discover devices via WSDAPI. [UDP 3702] |
32015 | Windows Peer to Peer Collaboration Foundation (WSD-Out) |
Windows Peer to Peer Collaboration Foundation (WSD-Out) |
32018 | Outbound rule for the Windows Peer to Peer Collaboration Foundation to discover devices via WSDAPI. [UDP 3702] |
Outbound rule for the Windows Peer to Peer Collaboration Foundation to discover devices via WSDAPI. [UDP 3702] |
32019 | Windows Peer to Peer Collaboration Foundation (PNRP-In) |
Windows Peer to Peer Collaboration Foundation (PNRP-In) |
32022 | Inbound rule for the Windows Peer to Peer Collaboration Foundation to allow Peer Name Resolution. [UDP 3540] |
Inbound rule for the Windows Peer to Peer Collaboration Foundation to allow Peer Name Resolution. [UDP 3540] |
32023 | Windows Peer to Peer Collaboration Foundation (PNRP-Out) |
Windows Peer to Peer Collaboration Foundation (PNRP-Out) |
32026 | Outbound rule for the Windows Peer to Peer Collaboration Foundation to allow Peer Name Resolution. [UDP 3540] |
Outbound rule for the Windows Peer to Peer Collaboration Foundation to allow Peer Name Resolution. [UDP 3540] |
32027 | Windows Peer to Peer Collaboration Foundation (SSDP-In) |
Windows Peer to Peer Collaboration Foundation (SSDP-In) |
32030 | Inbound rule for the Windows Peer to Peer Collaboration Foundation to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Inbound rule for the Windows Peer to Peer Collaboration Foundation to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
32031 | Windows Peer to Peer Collaboration Foundation (SSDP-Out) |
Windows Peer to Peer Collaboration Foundation (SSDP-Out) |
32034 | Outbound rule for the Windows Peer to Peer Collaboration Foundation to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Outbound rule for the Windows Peer to Peer Collaboration Foundation to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
32252 | Windows Meeting Space |
Windows Meeting Space |
32253 | Windows Meeting Space (DFSR-In) |
Windows Meeting Space (DFSR-In) |
32256 | Inbound rule for Windows Meeting Space to allow Distributed File System Replication traffic. [TCP 5722] |
Inbound rule for Windows Meeting Space to allow Distributed File System Replication traffic. [TCP 5722] |
32257 | Windows Meeting Space (DFSR-Out) |
Windows Meeting Space (DFSR-Out) |
32260 | Outbound rule for Windows Meeting Space to allow Distributed File System Replication traffic. [TCP 5722] |
Outbound rule for Windows Meeting Space to allow Distributed File System Replication traffic. [TCP 5722] |
32261 | Windows Meeting Space (TCP-In) |
Windows Meeting Space (TCP-In) |
32264 | Inbound rule for Windows Meeting Space to allow collaboration traffic. [TCP] |
Inbound rule for Windows Meeting Space to allow collaboration traffic. [TCP] |
32265 | Windows Meeting Space (TCP-Out) |
Windows Meeting Space (TCP-Out) |
32268 | Outbound rule for Windows Meeting Space to allow collaboration traffic. [TCP] |
Outbound rule for Windows Meeting Space to allow collaboration traffic. [TCP] |
32269 | Windows Meeting Space (UDP-In) |
Windows Meeting Space (UDP-In) |
32272 | Inbound rule for Windows Meeting Space to allow collaboration traffic. [UDP] |
Inbound rule for Windows Meeting Space to allow collaboration traffic. [UDP] |
32273 | Windows Meeting Space (UDP-Out) |
Windows Meeting Space (UDP-Out) |
32276 | Outbound rule for Windows Meeting Space to allow collaboration traffic. [UDP] |
Outbound rule for Windows Meeting Space to allow collaboration traffic. [UDP] |
32277 | Windows Meeting Space (P2P-In) |
Windows Meeting Space (P2P-In) |
32280 | Inbound rule for Windows Meeting Space to allow Peer Networking traffic. [TCP 3587] |
Inbound rule for Windows Meeting Space to allow Peer Networking traffic. [TCP 3587] |
32281 | Windows Meeting Space (P2P-Out) |
Windows Meeting Space (P2P-Out) |
32284 | Outbound rule for Windows Meeting Space to allow Peer Networking traffic. [TCP 3587] |
Outbound rule for Windows Meeting Space to allow Peer Networking traffic. [TCP 3587] |
32752 | Network Discovery |
Network Discovery |
32753 | Network Discovery (SSDP-In) |
Network Discovery (SSDP-In) |
32754 | Network Discovery for Teredo (SSDP-In) |
Network Discovery for Teredo (SSDP-In) |
32756 | Inbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Inbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
32757 | Network Discovery (SSDP-Out) |
Network Discovery (SSDP-Out) |
32760 | Outbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Outbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
32761 | Network Discovery (UPnP-In) |
Network Discovery (UPnP-In) |
32762 | Network Discovery for Teredo (UPnP-In) |
Network Discovery for Teredo (UPnP-In) |
32764 | Inbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP 2869] |
Inbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP 2869] |
32765 | Network Discovery (UPnP-Out) |
Network Discovery (UPnP-Out) |
32768 | Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP] |
Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP] |
32769 | Network Discovery (NB-Name-In) |
Network Discovery (NB-Name-In) |
32772 | Inbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137] |
Inbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137] |
32773 | Network Discovery (NB-Name-Out) |
Network Discovery (NB-Name-Out) |
32776 | Outbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137] |
Outbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137] |
32777 | Network Discovery (NB-Datagram-In) |
Network Discovery (NB-Datagram-In) |
32780 | Inbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138] |
Inbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138] |
32781 | Network Discovery (NB-Datagram-Out) |
Network Discovery (NB-Datagram-Out) |
32784 | Outbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138] |
Outbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138] |
32785 | Network Discovery (WSD-In) |
Network Discovery (WSD-In) |
32788 | Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702] |
Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702] |
32789 | Network Discovery (WSD-Out) |
Network Discovery (WSD-Out) |
32792 | Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702] |
Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702] |
32801 | Network Discovery (LLMNR-UDP-In) |
Network Discovery (LLMNR-UDP-In) |
32804 | Inbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355] |
Inbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355] |
32805 | Network Discovery (LLMNR-UDP-Out) |
Network Discovery (LLMNR-UDP-Out) |
32808 | Outbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355] |
Outbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355] |
32809 | Network Discovery (Pub-WSD-In) |
Network Discovery (Pub-WSD-In) |
32811 | Network Discovery (Pub WSD-Out) |
Network Discovery (Pub WSD-Out) |
32813 | Network Discovery (WSD EventsSecure-In) |
Network Discovery (WSD EventsSecure-In) |
32814 | Inbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358] |
Inbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358] |
32815 | Network Discovery (WSD EventsSecure-Out) |
Network Discovery (WSD EventsSecure-Out) |
32816 | Outbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358] |
Outbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358] |
32817 | Network Discovery (WSD Events-In) |
Network Discovery (WSD Events-In) |
32818 | Inbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357] |
Inbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357] |
32819 | Network Discovery (WSD Events-Out) |
Network Discovery (WSD Events-Out) |
32820 | Outbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357] |
Outbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357] |
32821 | Network Discovery (UPnPHost-Out) |
Network Discovery (UPnPHost-Out) |
32826 | Inbound rule for Network Discovery to discover devices via Device Association Framework. [UDP 3702] |
Inbound rule for Network Discovery to discover devices via Device Association Framework. [UDP 3702] |
33002 | Remote Assistance |
Remote Assistance |
33003 | Remote Assistance (TCP-In) |
Remote Assistance (TCP-In) |
33006 | Inbound rule for Remote Assistance traffic. [TCP] |
Inbound rule for Remote Assistance traffic. [TCP] |
33007 | Remote Assistance (TCP-Out) |
Remote Assistance (TCP-Out) |
33010 | Outbound rule for Remote Assistance traffic. [TCP] |
Outbound rule for Remote Assistance traffic. [TCP] |
33011 | Remote Assistance (RA Server TCP-In) |
Remote Assistance (RA Server TCP-In) |
33014 | Inbound rule for Remote Assistance to allow offers for assistance. [TCP] |
Inbound rule for Remote Assistance to allow offers for assistance. [TCP] |
33015 | Remote Assistance (RA Server TCP-Out) |
Remote Assistance (RA Server TCP-Out) |
33018 | Outbound rule for Remote Assistance to allow offers for assistance. [TCP] |
Outbound rule for Remote Assistance to allow offers for assistance. [TCP] |
33019 | Remote Assistance (SSDP UDP-In) |
Remote Assistance (SSDP UDP-In) |
33022 | Inbound rule for Remote Assistance to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Inbound rule for Remote Assistance to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
33023 | Remote Assistance (SSDP UDP-Out) |
Remote Assistance (SSDP UDP-Out) |
33026 | Outbound rule for Remote Assistance to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Outbound rule for Remote Assistance to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
33027 | Remote Assistance (SSDP TCP-In) |
Remote Assistance (SSDP TCP-In) |
33030 | Inbound rule for Remote Assistance to allow use of Universal Plug and Play. [TCP 2869] |
Inbound rule for Remote Assistance to allow use of Universal Plug and Play. [TCP 2869] |
33031 | Remote Assistance (SSDP TCP-Out) |
Remote Assistance (SSDP TCP-Out) |
33034 | Outbound rule for Remote Assistance to allow use of Universal Plug and Play. [TCP] |
Outbound rule for Remote Assistance to allow use of Universal Plug and Play. [TCP] |
33035 | Remote Assistance (DCOM-In) |
Remote Assistance (DCOM-In) |
33036 | Inbound rule for Remote Assistance to allow offers for assistance via DCOM. [TCP 135] |
Inbound rule for Remote Assistance to allow offers for assistance via DCOM. [TCP 135] |
33037 | Remote Assistance (PNRP-Out) |
Remote Assistance (PNRP-Out) |
33038 | Outbound rule for Remote Assistance to allow use of Peer Name Resolution Protocol. [UDP] |
Outbound rule for Remote Assistance to allow use of Peer Name Resolution Protocol. [UDP] |
33039 | Remote Assistance (PNRP-In) |
Remote Assistance (PNRP-In) |
33040 | Inbound rule for Remote Assistance to allow use Peer Name Resolution Protocol. [UDP 3540] |
Inbound rule for Remote Assistance to allow use Peer Name Resolution Protocol. [UDP 3540] |
33252 | Remote Scheduled Tasks Management |
Remote Scheduled Tasks Management |
33253 | Remote Scheduled Tasks Management (RPC) |
Remote Scheduled Tasks Management (RPC) |
33256 | Inbound rule for the Task Scheduler service to be remotely managed via RPC/TCP. |
Inbound rule for the Task Scheduler service to be remotely managed via RPC/TCP. |
33257 | Remote Scheduled Tasks Management (RPC-EPMAP) |
Remote Scheduled Tasks Management (RPC-EPMAP) |
33260 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Task Scheduler service. |
Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Task Scheduler service. |
33502 | Distributed Transaction Co-ordinator |
Distributed Transaction Coordinator |
33503 | Distributed Transaction Co-ordinator (TCP-In) |
Distributed Transaction Coordinator (TCP-In) |
33506 | Inbound rule to allow traffic for the Distributed Transaction Co-ordinator. [TCP] |
Inbound rule to allow traffic for the Distributed Transaction Coordinator. [TCP] |
33507 | Distributed Transaction Co-ordinator (TCP-Out) |
Distributed Transaction Coordinator (TCP-Out) |
33510 | Outbound rule to allow traffic for the Distributed Transaction Co-ordinator. [TCP] |
Outbound rule to allow traffic for the Distributed Transaction Coordinator. [TCP] |
33511 | Distributed Transaction Co-ordinator (RPC) |
Distributed Transaction Coordinator (RPC) |
33512 | Inbound rule for the Kernel Transaction Resource Manager for Distributed Transaction Co-ordinator service to be remotely managed via RPC/TCP. |
Inbound rule for the Kernel Transaction Resource Manager for Distributed Transaction Coordinator service to be remotely managed via RPC/TCP. |
33513 | Distributed Transaction Co-ordinator (RPC-EPMAP) |
Distributed Transaction Coordinator (RPC-EPMAP) |
33514 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Kernel Transaction Resource Manager for Distributed Transaction Co-ordinator service. |
Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Kernel Transaction Resource Manager for Distributed Transaction Coordinator service. |
33752 | Routing and Remote Access |
Routing and Remote Access |
33753 | Routing and Remote Access (L2TP-In) |
Routing and Remote Access (L2TP-In) |
33756 | Inbound rule for RRAS to allow Layer 2 Tunnel Protocol traffic. [UDP 1701] |
Inbound rule for RRAS to allow Layer 2 Tunnel Protocol traffic. [UDP 1701] |
33757 | Routing and Remote Access (L2TP-Out) |
Routing and Remote Access (L2TP-Out) |
33760 | Outbound rule for RRAS to allow Layer 2 Tunnel Protocol traffic. [UDP 1701] |
Outbound rule for RRAS to allow Layer 2 Tunnel Protocol traffic. [UDP 1701] |
33761 | Routing and Remote Access (PPTP-Out) |
Routing and Remote Access (PPTP-Out) |
33764 | Outbound rule for RRAS to allow Point-to-Point Tunnel Protocol traffic. [TCP 1723] |
Outbound rule for RRAS to allow Point-to-Point Tunnel Protocol traffic. [TCP 1723] |
33765 | Routing and Remote Access (PPTP-In) |
Routing and Remote Access (PPTP-In) |
33768 | Inbound rule for RRAS to allow Point-to-Point Tunnel Protocol traffic. [TCP 1723] |
Inbound rule for RRAS to allow Point-to-Point Tunnel Protocol traffic. [TCP 1723] |
33769 | Routing and Remote Access (GRE-In) |
Routing and Remote Access (GRE-In) |
33772 | Inbound rule for RRAS to allow Generic Routing Encapsulation Protocol traffic. |
Inbound rule for RRAS to allow Generic Routing Encapsulation Protocol traffic. |
33773 | Routing and Remote Access (GRE-Out) |
Routing and Remote Access (GRE-Out) |
33776 | Outbound rule for RRAS to allow Generic Routing Encapsulation Protocol Traffic |
Outbound rule for RRAS to allow Generic Routing Encapsulation Protocol Traffic |
34002 | Windows Collaboration Computer Name Registration Service |
Windows Collaboration Computer Name Registration Service |
34003 | Windows Collaboration Computer Name Registration Service (PNRP-In) |
Windows Collaboration Computer Name Registration Service (PNRP-In) |
34004 | Inbound rule for the Windows Collaboration Computer Name Registration Service to allow Peer Name Resolution. [UDP 3540] |
Inbound rule for the Windows Collaboration Computer Name Registration Service to allow Peer Name Resolution. [UDP 3540] |
34005 | Windows Collaboration Computer Name Registration Service (PNRP-Out) |
Windows Collaboration Computer Name Registration Service (PNRP-Out) |
34006 | Outbound rule for the Windows Collaboration Computer Name Registration Service to allow Peer Name Resolution. [UDP 3540] |
Outbound rule for the Windows Collaboration Computer Name Registration Service to allow Peer Name Resolution. [UDP 3540] |
34007 | Windows Collaboration Computer Name Registration Service (SSDP-In) |
Windows Collaboration Computer Name Registration Service (SSDP-In) |
34008 | Inbound rule for the Windows Collaboration Computer Name Registration Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Inbound rule for the Windows Collaboration Computer Name Registration Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
34009 | Windows Collaboration Computer Name Registration Service (SSDP-Out) |
Windows Collaboration Computer Name Registration Service (SSDP-Out) |
34010 | Outbound rule for the Windows Collaboration Computer Name Registration Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
Outbound rule for the Windows Collaboration Computer Name Registration Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
34251 | Windows Management Instrumentation (WMI) |
Windows Management Instrumentation (WMI) |
34252 | Windows Management Instrumentation (DCOM-In) |
Windows Management Instrumentation (DCOM-In) |
34253 | Inbound rule to allow DCOM traffic for remote Windows Management Instrumentation. [TCP 135] |
Inbound rule to allow DCOM traffic for remote Windows Management Instrumentation. [TCP 135] |
34254 | Windows Management Instrumentation (WMI-In) |
Windows Management Instrumentation (WMI-In) |
34255 | Inbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP] |
Inbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP] |
34256 | Windows Management Instrumentation (ASync-In) |
Windows Management Instrumentation (ASync-In) |
34257 | Inbound rule to allow Asynchronous WMI traffic for remote Windows Management Instrumentation. [TCP] |
Inbound rule to allow Asynchronous WMI traffic for remote Windows Management Instrumentation. [TCP] |
34258 | Windows Management Instrumentation (WMI-Out) |
Windows Management Instrumentation (WMI-Out) |
34259 | Outbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP] |
Outbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP] |
34501 | Remote Volume Management |
Remote Volume Management |
34502 | Remote Volume Management - Virtual Disk Service (RPC) |
Remote Volume Management - Virtual Disk Service (RPC) |
34503 | Inbound rule for the Remote Volume Management - Virtual Disk Service to be remotely managed via RPC/TCP. |
Inbound rule for the Remote Volume Management - Virtual Disk Service to be remotely managed via RPC/TCP. |
34504 | Remote Volume Management - Virtual Disk Service Loader (RPC) |
Remote Volume Management - Virtual Disk Service Loader (RPC) |
34505 | Inbound rule for the Remote Volume Management - Virtual Disk Service Loader to be remotely managed via RPC/TCP. |
Inbound rule for the Remote Volume Management - Virtual Disk Service Loader to be remotely managed via RPC/TCP. |
34506 | Remote Volume Management (RPC-EPMAP) |
Remote Volume Management (RPC-EPMAP) |
34507 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for Remote Volume Management. |
Inbound rule for the RPCSS service to allow RPC/TCP traffic for Remote Volume Management. |
34752 | Performance Logs and Alerts |
Performance Logs and Alerts |
34753 | Performance Logs and Alerts (TCP-In) |
Performance Logs and Alerts (TCP-In) |
34754 | Inbound rule for Performance Logs and Alerts traffic. [TCP-In] |
Inbound rule for Performance Logs and Alerts traffic. [TCP-In] |
34755 | Performance Logs and Alerts (DCOM-In) |
Performance Logs and Alerts (DCOM-In) |
34756 | Inbound rule for Performance Logs and Alerts to allow remote DCOM activation. [TCP-135] |
Inbound rule for Performance Logs and Alerts to allow remote DCOM activation. [TCP-135] |
35000 | The firewall rules that are part of Core Networking are required for reliable IPv4 and IPv6 connectivity. |
The firewall rules that are part of Core Networking are required for reliable IPv4 and IPv6 connectivity. |
35001 | Windows Remote Management - Compatibility Mode (HTTP-In) |
Windows Remote Management - Compatibility Mode (HTTP-In) |
35002 | Compatibility mode inbound rule for Windows Remote Management via WS-Management. [TCP 80] |
Compatibility mode inbound rule for Windows Remote Management via WS-Management. [TCP 80] |
36001 | Cast to Device functionality |
Cast to Device functionality |
36002 | Cast to Device streaming server (HTTP-Streaming-In) |
Cast to Device streaming server (HTTP-Streaming-In) |
36003 | Inbound rule for the Cast to Device server to allow streaming using HTTP. [TCP 10246] |
Inbound rule for the Cast to Device server to allow streaming using HTTP. [TCP 10246] |
36004 | Cast to Device streaming server (RTCP-Streaming-In) |
Cast to Device streaming server (RTCP-Streaming-In) |
36005 | Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [UDP] |
Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [UDP] |
36006 | Cast to Device streaming server (RTP-Streaming-Out) |
Cast to Device streaming server (RTP-Streaming-Out) |
36007 | Outbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [UDP] |
Outbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [UDP] |
36008 | Cast to Device streaming server (RTSP-Streaming-In) |
Cast to Device streaming server (RTSP-Streaming-In) |
36009 | Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [TCP 23554, 23555, 23556] |
Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [TCP 23554, 23555, 23556] |
36010 | Cast to Device functionality (qWave-UDP-In) |
Cast to Device functionality (qWave-UDP-In) |
36011 | Inbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
Inbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
36012 | Cast to Device functionality (qWave-UDP-Out) |
Cast to Device functionality (qWave-UDP-Out) |
36013 | Outbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
Outbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
36014 | Cast to Device functionality (qWave-TCP-In) |
Cast to Device functionality (qWave-TCP-In) |
36015 | Inbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
Inbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
36016 | Cast to Device functionality (qWave-TCP-Out) |
Cast to Device functionality (qWave-TCP-Out) |
36017 | Outbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
Outbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
36100 | Cast to Device streaming server hardening rules for RTSP |
Cast to Device streaming server hardening rules for RTSP |
36101 | Allow incoming RTSP connections to the Cast to Device streaming server |
Allow incoming RTSP connections to the Cast to Device streaming server |
36102 | Cast to Device streaming server hardening - Block incoming TCP traffic |
Cast to Device streaming server hardening - Block incoming TCP traffic |
36103 | Cast to Device streaming server hardening - Block outgoing TCP traffic |
Cast to Devicestreaming server hardening - Block outgoing TCP traffic |
36104 | Cast to Device SSDP Discovery (UDP-In) |
Cast to Device SSDP Discovery (UDP-In) |
36105 | Inbound rule to allow discovery of Cast to Device targets using SSDP |
Inbound rule to allow discovery of Cast to Device targets using SSDP |
36106 | Cast to Device UPnP Events (TCP-In) |
Cast to Device UPnP Events (TCP-In) |
36107 | Inbound rule to allow receiving UPnP Events from Cast to Device targets |
Inbound rule to allow receiving UPnP Events from Cast to Device targets |
36251 | Proximity Sharing |
Proximity Sharing |
36252 | Proximity sharing over TCP (TCP sharing-In) |
Proximity sharing over TCP (TCP sharing-In) |
36253 | Inbound rule for Proximity sharing over TCP |
Inbound rule for Proximity sharing over TCP |
36254 | Proximity sharing over TCP (TCP sharing-Out) |
Proximity sharing over TCP (TCP sharing-Out) |
36255 | Outbound rule for Proximity sharing over TCP |
Outbound rule for Proximity sharing over TCP |
36501 | TPM Virtual Smart Card Management |
TPM Virtual Smart Card Management |
36502 | TPM Virtual Smart Card Management (DCOM-In) |
TPM Virtual Smart Card Management (DCOM-In) |
36503 | Inbound rule for remote TPM Virtual Smart Card Management to allow DCOM activation. [TCP 135] |
Inbound rule for remote TPM Virtual Smart Card Management to allow DCOM activation. [TCP 135] |
36504 | TPM Virtual Smart Card Management (TCP-In) |
TPM Virtual Smart Card Management (TCP-In) |
36505 | Inbound rule for remote TPM Virtual Smart Card Management traffic. [TCP] |
Inbound rule for remote TPM Virtual Smart Card Management traffic. [TCP] |
36506 | TPM Virtual Smart Card Management (TCP-Out) |
TPM Virtual Smart Card Management (TCP-Out) |
36507 | Outbound rule for remote TPM Virtual Smart Card Management traffic. [TCP] |
Outbound rule for remote TPM Virtual Smart Card Management traffic. [TCP] |
36751 | Remote Shut-down |
Remote Shutdown |
36753 | In-bound Rule for Remote Shut-down (TCP-In) |
Inbound Rule for Remote Shutdown (TCP-In) |
36754 | In-bound rule for the Remote Shut-down via dynamic RPC/TCP. |
Inbound rule for the Remote Shutdown via dynamic RPC/TCP. |
36755 | In-bound Rule for Remote Shut-down (RPC-EP-In) |
Inbound Rule for Remote Shutdown (RPC-EP-In) |
36756 | In-bound rule for the RPCSS service to allow RPC/TCP traffic |
Inbound rule for the RPCSS service to allow RPC/TCP traffic |
36801 | Remote Event Monitor |
Remote Event Monitor |
36802 | Remote Event Monitor (RPC) |
Remote Event Monitor (RPC) |
36803 | Inbound rule for remote event monitoring via RPC/TCP. |
Inbound rule for remote event monitoring via RPC/TCP. |
36804 | Remote Event Monitor (RPC-EPMAP) |
Remote Event Monitor (RPC-EPMAP) |
36805 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for remote event monitoring. |
Inbound rule for the RPCSS service to allow RPC/TCP traffic for remote event monitoring. |
36851 | WiFi Direct Network Discovery |
Wi-Fi Direct Network Discovery |
36852 | WiFi Direct Network Discovery (In) |
Wi-Fi Direct Network Discovery (In) |
36853 | Inbound rule to discover WSD devices on WiFi Direct networks. |
Inbound rule to discover WSD devices on Wi-Fi Direct networks. |
36854 | WiFi Direct Network Discovery (Out) |
Wi-Fi Direct Network Discovery (Out) |
36855 | Outbound rule to discover WSD devices on WiFi Direct networks. |
Outbound rule to discover WSD devices on Wi-Fi Direct networks. |
36856 | WiFi Direct Spooler Use (In) |
Wi-Fi Direct Spooler Use (In) |
36857 | Inbound rule to use WSD printers on WiFi Direct networks. |
Inbound rule to use WSD printers on Wi-Fi Direct networks. |
36858 | WiFi Direct Spooler Use (Out) |
Wi-Fi Direct Spooler Use (Out) |
36859 | Outbound rule to use WSD printers on WiFi Direct networks. |
Outbound rule to use WSD printers on Wi-Fi Direct networks. |
36860 | WiFi Direct Scan Service Use (In) |
Wi-Fi Direct Scan Service Use (In) |
36861 | Inbound rule to use WSD scanners on WiFi Direct networks. |
Inbound rule to use WSD scanners on Wi-Fi Direct networks. |
36862 | WiFi Direct Scan Service Use (Out) |
Wi-Fi Direct Scan Service Use (Out) |
36863 | Outbound rule to use WSD scanners on WiFi Direct networks. |
Outbound rule to use WSD scanners on Wi-Fi Direct networks. |
36902 | Software Load Balancer |
Software Load Balancer |
36903 | Software Load Balancer Multiplexer (TCP-In) |
Software Load Balancer Multiplexer (TCP-In) |
36904 | The Software Load Balancer Multiplexer enables TCP communication to the Network Controller. [TCP] |
The Software Load Balancer Multiplexer enables TCP communication to the Network Controller. [TCP] |
37002 | AllJoyn Router |
AllJoyn Router |
37003 | AllJoyn Router (TCP-In) |
AllJoyn Router (TCP-In) |
37004 | Inbound rule for AllJoyn Router traffic [TCP] |
Inbound rule for AllJoyn Router traffic [TCP] |
37005 | AllJoyn Router (TCP-Out) |
AllJoyn Router (TCP-Out) |
37006 | Outbound rule for AllJoyn Router traffic [TCP] |
Outbound rule for AllJoyn Router traffic [TCP] |
37007 | AllJoyn Router (UDP-In) |
AllJoyn Router (UDP-In) |
37008 | Inbound rule for AllJoyn Router traffic [UDP] |
Inbound rule for AllJoyn Router traffic [UDP] |
37009 | AllJoyn Router (UDP-Out) |
AllJoyn Router (UDP-Out) |
37010 | Outbound rule for AllJoyn Router traffic [UDP] |
Outbound rule for AllJoyn Router traffic [UDP] |
37101 | DIAL protocol server |
DIAL protocol server |
37102 | DIAL protocol server (HTTP-In) |
DIAL protocol server (HTTP-In) |
37103 | Inbound rule for DIAL protocol server to allow remote control of Apps using HTTP. [TCP 10247] |
Inbound rule for DIAL protocol server to allow remote control of Apps using HTTP. [TCP 10247] |
37302 | mDNS |
mDNS |
37303 | mDNS (UDP-In) |
mDNS (UDP-In) |
37304 | Inbound rule for mDNS traffic [UDP] |
Inbound rule for mDNS traffic [UDP] |
37305 | mDNS (UDP-Out) |
mDNS (UDP-Out) |
37306 | Outbound rule for mDNS traffic [UDP] |
Outbound rule for mDNS traffic [UDP] |
38002 | This feature is used for machine counting and licence compliance in enterprise environments. |
This feature is used for machine counting and license compliance in enterprise environments. |
38252 | This feature allows Background Intelligent Transfer Service (BITS) clients that are in the same subnet to locate and share files that are stored in the BITS cache. (Uses WSDAPI and RPC) |
This feature allows Background Intelligent Transfer Service (BITS) clients that are in the same subnet to locate and share files that are stored in the BITS cache. (Uses WSDAPI and RPC) |
38502 | This feature is used for sharing local files and printers with other users on the network. (Uses NetBIOS, LLMNR, SMB and RPC) |
This feature is used for sharing local files and printers with other users on the network. (Uses NetBIOS, LLMNR, SMB and RPC) |
38602 | This feature is used for sharing local files over RDMA using the SMBDirect protocol. (Uses RDMA) |
This feature is used for sharing local files over RDMA using the SMBDirect protocol. (Uses RDMA) |
38752 | This feature is used for accessing the desktop from a remote system. |
This feature is used for accessing the desktop from a remote system. |
39002 | This feature is used for connecting to iSCSI target servers and devices. |
This feature is used for connecting to iSCSI target servers and devices. |
39252 | This feature allows remote viewing and management of the local event log. (Uses Named Pipes and RPC) |
This feature allows remote viewing and management of the local event log. (Uses Named Pipes and RPC) |
39502 | This feature allows remote management of local services. (Uses Named Pipes and RPC) |
This feature allows remote management of local services. (Uses Named Pipes and RPC) |
39752 | The feature allows remotely manageable services to receive RPC traffic. (Uses Named Pipes and RPC) |
The feature allows remotely manageable services to receive RPC traffic. (Uses Named Pipes and RPC) |
40002 | This feature allows remote management of the local Windows Firewall. (Uses RPC) |
This feature allows remote management of the local Windows Firewall. (Uses RPC) |
40252 | This feature allows remote management of the system via WS-Management, a web services-based protocol for remote management of operating systems and devices. |
This feature allows remote management of the system via WS-Management, a web services-based protocol for remote management of operating systems and devices. |
40502 | This feature allows the transfer of media from your network enabled camera or media device to your computer using the Media Transfer Protocol (MTP). (Uses UPnP and SSDP) |
This feature allows the transfer of media from your network enabled camera or media device to your computer using the Media Transfer Protocol (MTP). (Uses UPnP and SSDP) |
40752 | This feature allows Media Center Extenders to communicate with a computer running Windows Media Center. (Uses SSDP and qWave) |
This feature allows Media Center Extenders to communicate with a computer running Windows Media Center. (Uses SSDP and qWave) |
41002 | This feature allows users to receive streaming media over UDP. |
This feature allows users to receive streaming media over UDP. |
41252 | This feature enables users to share media over a network. (Uses UPnP, SSDP and qWave) |
This feature enables users to share media over a network. (Uses UPnP, SSDP and qWave) |
41500 | This feature allows users to share home media over the Internet |
This feature allows users to share out home media over the Internet |
41752 | This feature enables users to connect to projectors over wired or wireless networks to project presentations. (Uses WSDAPI) |
This feature enables users to connect to projectors over wired or wireless networks to project presentations. (Uses WSDAPI) |
42002 | This feature is required to enable various peer-to-peer programs and technologies. (Uses SSDP and PNRP) |
This feature is required to enable various peer-to-peer programs and technologies. (Uses SSDP and PNRP) |
42252 | This feature is used for collaborating over a network to share documents, programs or your desktop with other people. (Uses DFSR and P2P) |
This feature is used for collaborating over a network to share documents, programs or your desktop with other people. (Uses DFSR and P2P) |
42752 | This feature allows this computer to discover other devices and be discovered by other devices on the network. (Uses Function Discovery Host and Publication Services, UPnP, SSDP, NetBIOS and LLMNR) |
This feature allows this computer to discover other devices and be discovered by other devices on the network. (Uses Function Discovery Host and Publication Services, UPnP, SSDP, NetBIOS and LLMNR) |
43002 | This feature allows users of this computer to request remote assistance from other users on the network. (Uses UPnP, SSDP, PNRP and Teredo) |
This feature allows users of this computer to request remote assistance from other users on the network. (Uses UPnP, SSDP, PNRP and Teredo) |
43252 | This feature allows remote management of the local task scheduling service. (Uses RPC) |
This feature allows remote management of the local task scheduling service. (Uses RPC) |
43502 | This feature co-ordinates transactions that update transaction-protected resources, such as databases, message queues and file systems. |
This feature coordinates transactions that update transaction-protected resources, such as databases, message queues and file systems. |
43752 | This feature is used to allow incoming VPN and RAS connections. |
This feature is used to allow incoming VPN and RAS connections. |
44002 | This feature allows other computers to find and communicate with your computer using the Peer Name Resolution Protocol. (Uses SSDP and PNRP) |
This feature allows other computers to find and communicate with your computer using the Peer Name Resolution Protocol. (Uses SSDP and PNRP) |
44251 | This feature allows remote management of Windows by exposing a set of manageable components in a set of classes defined by the Common Information Model (CIM) of the distributed management task force. (Uses DCOM) |
This feature allows remote management of Windows by exposing a set of manageable components in a set of classes defined by the Common Information Model (CIM) of the distributed management task force. (Uses DCOM) |
44501 | This feature provides remote software and hardware disk volume management. (Uses RPC) |
This feature provides remote software and hardware disk volume management. (Uses RPC) |
44752 | This feature allows remote management of the Performance Logs and Alerts service. (Uses RPC) |
This feature allows remote management of the Performance Logs and Alerts service. (Uses RPC) |
46001 | This feature enables streaming of music, video and pictures to DLNA Digital Media Renderer devices. |
This feature enables streaming of music, video and pictures to DLNA Digital Media Renderer devices. |
46251 | This feature enables sharing of content between two PCs with proximity devices when tapped together. |
This feature enables sharing of content between two PCs with proximity devices when tapped together. |
46501 | This feature allows remote management of TPM virtual smart card devices. (Uses DCOM) |
This feature allows remote management of TPM virtual smart card devices. (Uses DCOM) |
46751 | This feature allows remote shut-down/restart of a computer |
This feature allows remote shutdown/restart of a computer |
46801 | This feature allows remote event monitoring. (Uses RPC) |
This feature allows remote event monitoring. (Uses RPC) |
46851 | This feature allows this computer to discover printers connected via WFD. |
This feature allows this computer to discover printers connected via WFD. |
46901 | This group contains Rules for Software Load Balancer |
This group contains Rules for Software Load Balancer |
47001 | This group contains Rules for the AllJoyn Router |
This group contains Rules for the AllJoyn Router |
47101 | This group contains Rules for DIAL protocol that enables apps discovery and launching on remote devices |
This group contains Rules for DIAL protocol that enables apps discovery and launching on remote devices |
47301 | This group contains rules for mDNS. |
This group contains rules for mDNS. |