Windows 10 DLL File Information - FirewallAPI.dll |
The following DLL report was generated by automatic DLL script that scanned and loaded all DLL files in the system32 directory of Windows 10, extracted the information from them, and then saved it into HTML reports. If you want to view a report of another DLL, go to the main page of this Web site.
General Information
File Description: | Windows Firewall API |
File Version: | 10.0.10130.0 (fbl_impressive.150522-2224) |
Company: | Microsoft Corporation |
Product Name: | Microsoft® Windows® Operating System |
DLL popularity | Medium - 20 other DLL files in system32 directory are statically linked to this file. |
File Size: | 351 KB |
Total Number of Exported Functions: | 196 |
Total Number of Exported Functions With Names: | 196 |
Section Headers
Name | Virtual Address | Raw Data Size | % of File | Characteristics | Section Contains... |
---|---|---|---|---|---|
.text | 0x00001000 | 301,568 Bytes | 83.9% | Read, Execute | Code |
.data | 0x0004b000 | 1,536 Bytes | 0.4% | Write, Read | Initialized Data |
.idata | 0x0004c000 | 6,656 Bytes | 1.9% | Read | Initialized Data |
.didat | 0x0004e000 | 1,024 Bytes | 0.3% | Write, Read | Initialized Data |
.rsrc | 0x0004f000 | 26,112 Bytes | 7.3% | Read | Initialized Data |
.reloc | 0x00056000 | 21,504 Bytes | 6.0% | Read, Discardable | Initialized Data |
Static Linking
FirewallAPI.dll is statically linked to the following files:msvcrt.dll
ntdll.dll
RPCRT4.dll
api-ms-win-core-com-midlproxystub-l1-1-0.dll
api-ms-win-core-synch-l1-2-0.dll
api-ms-win-core-libraryloader-l1-2-0.dll
api-ms-win-core-string-l2-1-0.dll
api-ms-win-core-errorhandling-l1-1-1.dll
api-ms-win-core-registry-l1-1-0.dll
api-ms-win-core-sysinfo-l1-2-1.dll
api-ms-win-core-memory-l1-1-2.dll
api-ms-win-core-string-l1-1-0.dll
api-ms-win-core-heap-l1-2-0.dll
api-ms-win-security-base-l1-2-0.dll
api-ms-win-core-version-l1-1-0.dll
api-ms-win-core-heap-l2-1-0.dll
api-ms-win-core-localization-l1-2-1.dll
api-ms-win-core-processthreads-l1-1-2.dll
api-ms-win-core-threadpool-l1-2-0.dll
api-ms-win-core-debug-l1-1-1.dll
api-ms-win-core-profile-l1-1-0.dll
api-ms-win-core-string-obsolete-l1-1-0.dll
api-ms-win-core-delayload-l1-1-1.dll
This means that when FirewallAPI.dll is loaded, the above files are automatically loaded too. If one of these files is corrupted or missing, FirewallAPI.dll won't be loaded.
General Resources Information
Resource Type | Number of Items | Total Size | % of File |
---|---|---|---|
Icons | 0 | 0 Bytes | 0.0% |
Animated Icons | 0 | 0 Bytes | 0.0% |
Cursors | 0 | 0 Bytes | 0.0% |
Animated Cursors | 0 | 0 Bytes | 0.0% |
Bitmaps | 0 | 0 Bytes | 0.0% |
AVI Files | 0 | 0 Bytes | 0.0% |
Dialog-Boxes | 0 | 0 Bytes | 0.0% |
HTML Related Files | 0 | 0 Bytes | 0.0% |
Menus | 0 | 0 Bytes | 0.0% |
Strings | 1,015 | 135,318 Bytes | 37.6% |
Type Libraries | 1 | 21,004 Bytes | 5.8% |
Manifest | 0 | 0 Bytes | 0.0% |
All Others | 3 | 4,515 Bytes | 1.3% |
Total | 1,019 | 160,837 Bytes | 44.7% |
Icons in this file
No icons found in this file
Cursors in this file
No cursors found in this file
Dialog-boxes list (up to 1000 dialogs)
No dialog resources in this file.
String resources in this dll (up to 1000 strings)
String ID | String Text |
---|---|
1657 | Firewall log files (*.log) |
1658 | Browse |
1675 | The value entered for the log file size is not valid. Enter a value between 1 and 32767 k. |
23000 | File and Printer Sharing |
23001 | NetBIOS Name Service |
23002 | NetBIOS Datagram Service |
23004 | NetBIOS Session Service |
23005 | SMB over TCP |
23006 | UPnP Framework |
23007 | SSDP Component of UPnP Framework |
23008 | UPnP Framework over TCP |
23009 | Remote Desktop |
23012 | Domain Name Server (DNS) |
23013 | Dynamic Host Configuration Protocol Server (DHCP) |
23014 | Dynamic Host Configuration Protocol Client (DHCP) |
23015 | Incoming Connection VPN (PPTP) |
23016 | Incoming Connection VPN (L2TP) |
23017 | IP Security (IPsec - IKE) |
23018 | IP Security (IPsec - IKE/NAT-T) |
23038 | Phase 1: Local address = %s, Remote address = %s |
23039 | Phase 2: Local address = %s, Remote address = %s |
23040 | , Protocol = 0x%x |
23041 | , Protocol = Any |
23042 | , Local port = 0x%x |
23043 | , Local port = Any |
23044 | , Remote port = 0x%x |
23045 | , Remote port = Any |
23090 | Windows Firewall |
23091 | Windows Firewall helps protect your computer by preventing unauthorized users from gaining access to your computer through the Internet or a network. |
23092 | Windows Firewall Authorization Driver |
23093 | Windows Firewall Authorization Driver is a kernel mode driver that provides deep inspection services on inbound and outbound network traffic. |
23094 | Allow authenticated IPsec bypass |
23095 | Allows specific computers to have unrestricted, but authenticated, access to the computer. |
23102 | Enabled |
23103 | Disabled |
23104 | Group Policy |
23105 | Local Policy |
23106 | Group and Local Policy |
23107 | Domain |
23108 | Private |
23109 | All interfaces |
23112 | Don't allow exceptions |
23113 | All subnets |
23114 | Local subnet only |
23115 | Custom subnets |
23117 | Remove |
23118 | Modify |
23119 | Allow outgoing destination unreachable |
23120 | Allow outgoing source quench |
23121 | Allow redirect |
23122 | Allow incoming echo request |
23123 | Allow incoming router request |
23124 | Allow outgoing time exceeded |
23125 | Allow outgoing parameter problem |
23126 | Allow incoming timestamp request |
23127 | Allow incoming mask request |
23128 | Allow outgoing packet too big |
23129 | The rule was parsed successfully from the store. |
23130 | The rule is from a later version of the service. Some fields were not understood and have been ignored. This may cause the rule to be less restrictive than on the version where it was created. To mitigate any risk from this fallback behavior, ensure that the original rule is as specific as possible. To avoid this fallback behavior, create version-specific GPO's, or apply a Platform condition to the rule. |
23131 | The rule is from a newer schema version than the service, and the unknown fields could not be ignored. The whole rule was ignored. |
23132 | The name contains invalid characters, or is an invalid length. |
23133 | The description contains invalid characters, or is an invalid length. |
23134 | The application contains invalid characters, or is an invalid length. |
23135 | The service contains invalid characters, or is an invalid length. |
23136 | The authorized remote machines list contains invalid characters, or is an invalid length. |
23137 | The authorized remote users list contains invalid characters, or is an invalid length. |
23138 | The group (sometimes called the embedded context) contains invalid characters, or is an invalid length. |
23139 | The service was unable to parse the rule. |
23140 | An invalid port range was specified, or 0 was used as a port number. |
23141 | Some of the keywords specified on the remote address are only valid on the local address. |
23142 | Number of interfaces and interface buffer don't match. |
23143 | The interface type is invalid. |
23144 | The action is invalid. |
23145 | The direction is invalid. |
23146 | The protocol-specific options do not match the protocol that was chosen. |
23147 | The rule was parsed successfully, but there was an unknown semantic error when processing the rule. |
23148 | An error occurred. |
23149 | Enable Windows Firewall |
23150 | Disable Stealth Mode |
23151 | Windows Firewall Shielded Mode |
23152 | Disable Unicast Responses to Multicast |
23153 | Log Dropped Packets |
23154 | Log Successful Connections |
23155 | Log Ignored Rules |
23156 | Maximum Log File Size |
23157 | Log File Path |
23158 | Disable Inbound Notifications |
23159 | Allow User preferred merge of Authorized Applications |
23160 | Allow User preferred merge of Globally open ports |
23161 | Allow Local Policy Merge |
23162 | Allow Local IPsec Policy Merge |
23163 | Disabled Interfaces |
23164 | Default Outbound Action |
23165 | Default Inbound Action |
23166 | Current Profile |
23167 | Disable Stateful FTP |
23168 | Ignored Disable Stateful PPTP |
23169 | IPsec SA Idle time |
23170 | IPsec preshared key encoding |
23171 | IPsec Exempt |
23172 | IPsec CRL Check |
23173 | <All> |
23174 | Allow |
23175 | Block |
23176 | The rule ID contains invalid characters, or is an invalid length. |
23177 | The phase 1 auth set ID contains invalid characters, or is an invalid length. |
23178 | The quick mode crypto set ID contains invalid characters, or is an invalid length. |
23179 | The main mode crypto set ID contains invalid characters, or is an invalid length. |
23180 | The application name could not be resolved. |
23181 | The Rule ID was not specified. |
23182 | Mismatch in number of ports and ports buffer. |
23183 | One of the port keywords is invalid. |
23184 | Mismatch in number of V4 address subnets and subnets buffer. |
23185 | Mismatch in number of V6 address subnets and subnets buffer. |
23186 | Mismatch in number of V4 address ranges and ranges buffer. |
23187 | Mismatch in number of V6 address ranges and ranges buffer. |
23188 | The address range is invalid. The end address is less than the beginning address. |
23189 | One or more of the subnet masks is invalid. |
23190 | One or more of the address prefixes is invalid. |
23191 | One or more of the address keywords are invalid. |
23192 | Some of the keywords specified on the local address are only valid on the remote address. |
23193 | Mismatch in number of ICMP and ICMP buffer. |
23194 | Invalid ICMP code specified. |
23195 | Allow-Bypass action specified, but the rule does not meet allow-bypass criteria (inbound, authenticate/encrypt flags set, remote machine auth list specified) |
23196 | The protocol number is invalid. |
23197 | Invalid flags specified. |
23198 | Autogenerate flag is set but Authenticate / Authenticate-encrypt flags are not set. |
23199 | Autogenerate flag is set but the action is block. |
23200 | Autogenerate flag is set along with Dynamic RPC flag. |
23201 | The Authentication and Authentication & Encryption flags cannot be used together. |
23202 | Authorization lists can only be used if authentication is required on the rule. |
23203 | Number of valid OS Platforms and the list of valid OS Platforms don't match |
23204 | The phase 1 auth set ID must be specified. |
23205 | The quick mode crypto set ID must be specified. |
23206 | The Set ID was not specified. |
23207 | The IPsec phase is invalid. |
23208 | No suites specified in the set. |
23209 | One of the phase 1 auth methods is invalid. |
23210 | One of the phase 2 auth methods is invalid. |
23211 | Anonymous cannot be the only authentication method. |
23212 | Invalid auth suite flags specified. |
23213 | Machine certificates can only be used in phase 2 auth if they are machine health certificates. |
23214 | Machine Preshared Key was selected as an authentication type, but no key string was specified. |
23215 | The certificate authority name is required, and must be formatted as an X.509 distinguished name. |
23216 | Both machine and user auth cannot be proposed within the same authentication set. |
23217 | The main mode crypto set ID must be specified. |
23218 | The phase 1 crypto set flags are invalid. |
23219 | The main mode lifetime, in minutes, is invalid. |
23220 | The main mode lifetime, in sessions, is invalid. |
23221 | One of the main mode key exchange algorithms is invalid. |
23222 | One of the main mode encryption algorithms is invalid. |
23223 | One of the main mode hash algorithms is invalid. |
23224 | One of the quick mode key exchange algorithms is invalid. |
23225 | One of the quick mode encapsulation types is invalid. |
23226 | One of the quick mode encryption algorithms is invalid. |
23227 | One of the quick mode hash algorithms is invalid. |
23228 | The quick mode lifetime, in minutes, is invalid. |
23229 | The quick mode lifetime, in kilobytes, is invalid. |
23230 | Remote user authorization can only be applied to inbound rules. |
23231 | An unspecified, multicast, broadcast, or loopback IPv6 address was specified. |
23232 | If the action is Do Not Secure, the auth and crypto sets must be null. |
23233 | Either Encryption or Hash must be specified. |
23234 | Block action was specified in conjunction with require security or require encryption. |
23235 | The phase 1 authentication set was not found. |
23236 | The phase 2 authentication set was not found. |
23237 | The quick mode cryptographic set was not found. |
23238 | A conflict was detected between the phase 1 and phase 2 authentication sets. When preshared keys are used in phase 1, there cannot be a phase 2 authentication set. |
23239 | A local address cannot be used in conjunction with an interface or interface type condition. |
23240 | Program Name |
23241 | Interfaces |
23242 | Local Addresses |
23243 | Remote Addresses |
23244 | Local Port |
23245 | Remote Port |
23246 | EndPoint 1 Addresses |
23247 | EndPoint 2 Addresses |
23248 | Endpoint 1 Port |
23249 | Endpoint 2 Port |
23250 | Not Configured |
23251 | The profile type is invalid. |
23252 | Public |
23253 | An unspecified, multicast, broadcast, or loopback IPv4 address was specified. |
23254 | Machine health certificates and regular certificates cannot both be proposed within the same authentication set. |
23255 | None |
23256 | Endpoint 'any' cannot be specified for a tunnel-mode rule. |
23257 | IPsec Through NAT |
23258 | Policy Version |
23259 | The target schema version specified is not supported. |
23260 | The same authentication method cannot be used more than once within a set. |
23261 | This error value is not used. |
23262 | The target schema version does not support port ranges. |
23263 | The Authentication (Dynamic Encryption) flag cannot be used when direction is Outbound. |
23264 | When the Authentication (Dynamic Encryption) flag is set, the Authentication & Encryption flag must be set as well. |
23265 | The target schema version does not support Authentication (Dynamic Encryption). |
23266 | The target schema version does not support outbound Allow-Bypass rules. |
23267 | Allow-Bypass action specified, but the rule does not meet allow-bypass criteria (authenticate/encrypt flags set) |
23268 | Defer to user' setting can only be used in a firewall rule where program path and TCP/UDP protocol are specified with no additional conditions. |
23269 | Port ranges are only allowed in connection security rules when the action is Do Not Secure. |
23270 | The target schema version does not support the platform operator specified. |
23271 | The DTM flag requires at least one dynamic endpoint. |
23272 | A dynamic tunnel-mode exemption rule cannot have tunnel endpoints. |
23273 | The target schema version does not support tunnel-mode exemptions. |
23274 | Authentication mode,"Require inbound and clear outbound" can only be set when using IPsec tunneling. |
23275 | Bypass Tunnel If Secure may not be set on Transport-Mode rules. |
23276 | One of the platform operators is invalid. |
23277 | %s unregistered from Windows Firewall. |
23278 | %s unregistered from Windows Firewall. Windows Firewall is now controlling the filtering for %s. |
23279 | FirewallRuleCategory |
23280 | ConSecRuleCategory |
23281 | StealthRuleCategory |
23282 | BootTimeRuleCategory |
23284 | Authentication (No Encapsulation) cannot be specified on a tunnel-mode rule. |
23285 | Authentication (No Encapsulation) cannot be specified on a rule that uses a preshared key. |
23286 | The target schema version does not support certificate criteria. |
23287 | Certificate criteria version does not match schema version. |
23288 | The certificate criteria are invalid. A thumbprint hash must be specified when FollowRenewal is used. |
23289 | The certificate criteria are invalid. The thumbprint hash is invalid. |
23290 | The certificate criteria are invalid. One or more of the EKU's are invalid. |
23291 | The certificate criteria are invalid. The name type is invalid. |
23292 | The certificate criteria are invalid. The subject name is not valid. |
23293 | The certificate criteria are invalid. The criteria type flags are invalid. |
23294 | The certificate criteria are invalid. You need to specify at least one set of validation criteria and one set of selection criteria for each set of certificate proposal with the same signing method. |
23295 | The local user authorization list contains invalid characters, or is an invalid length. |
23296 | The authorized local user list may not be used in conjunction with a service SID. |
23297 | The target schema version does not support the authorized local user list. |
23298 | Disable Stealth Mode IPsec Secured Packet Exemption |
23299 | The Kerberos proxy name must be a fully qualified domain name (FQDN). For example: kerbproxy.contoso.com |
23300 | IPsec Policy Agent service hardening - LDAP/TCP |
23301 | Allow IPsec Policy Agent outbound LDAP/TCP traffic to Active Directory |
23302 | IPsec Policy Agent service hardening - LDAP/UDP |
23303 | Allow IPsec Policy Agent outbound LDAP/UDP traffic to Active Directory |
23304 | IPsec Policy Agent service hardening - Block any other traffic to IPsec Policy Agent |
23305 | IPsec Policy Agent service hardening - Block any other traffic from IPsec Policy Agent |
23306 | MpsSvc service hardening - Block any other traffic to MpsSvc |
23307 | MpsSvc service hardening - Block any other traffic from MpsSvc |
23308 | Inbound service restriction rule for %1!s! |
23309 | Block all inbound traffic to service %1!s! |
23310 | Outbound service restriction rule for %1!s! |
23311 | Block all outbound traffic from service %1!s! |
23312 | IPsec Policy Agent service hardening - Remote Management |
23313 | Allow IPsec Policy Agent inbound RPC/TCP traffic for Remote Management |
23400 | The remote endpoints are invalid. |
23401 | The remote endpoint FQDN is invalid. |
23402 | The choice of key modules is invalid. |
23403 | The forward path SA lifetime is invalid. |
23404 | The target schema version does not support custom key module preferences. |
23405 | The target schema version does not support transport rule machine authorization lists. |
23406 | The target schema version does not support transport rule user authorization lists. |
23407 | Transport machine authorization SDDL specified on tunnel-mode rule. |
23408 | Transport user authorization SDDL specified on tunnel-mode rule. |
23409 | The Apply Global Authorization flag cannot be used when a per-rule authorization list is also specified. |
23410 | The transport rule machine SDDL is not valid. |
23411 | The transport rule user SDDL is not valid. |
23412 | This error value is not used. |
23413 | The phase 2 auth set ID contains invalid characters, or is an invalid length. |
23414 | The target schema version does not support dynamic endpoints. |
23415 | When specifying tunnel endpoints in both IPv4 and IPv6, a tunnel endpoint may not be dynamic for one address family and explicit for the other. (A dynamic tunnel endpoint is one set to "Any".) |
23416 | The edge traversal flags are inconsistent. Defer To App must be set without Edge Traversal, but Defer To User must be set with Edge Traversal. |
23417 | The target schema version does not support Authentication (No Encapsulation). |
23418 | When the Authentication (No Encapsulation) flag is set, the Authentication flag must be set as well. |
23419 | The target schema version does not support tunnel authentication modes. |
23420 | The target schema version does not support tunnel authentication modes. |
23421 | The target schema version does not support the IP_HTTPS keyword. |
23422 | The target schema version does not support the IP_TLS keyword. |
23423 | The target schema version does not support dynamic edge traversal. |
23424 | The local user owner SID is invalid. |
23425 | The target schema version does not support the local user owner field. |
23426 | The target schema version does not support profile crossing. |
23427 | The target schema version does not support one or more of the address keywords given. |
23428 | The application package SID is invalid. |
23429 | The target schema version does not support application package SIDs. |
23430 | Logical endpoints (trust tuples) cannot be combined with specific addresses or ports. |
23431 | One or more of the logical endpoints (trust tuples) are invalid. |
23432 | The target schema version does not support logical endpoints (trust tuples). |
23433 | The target schema version does not support the Key Manager Dictation flag. |
23434 | The target schema version does not support the Key Manager Notification flag. |
23435 | The target schema version does not support one or more of the authentication methods given. |
23436 | The target schema version does not support the requested certificate signing algorithm. |
23437 | The target schema version does not support targeting Intermediate CA's. |
23438 | When specifying multiple certificate authentication proposals, all the certificate proposals with the same signing method must must be grouped together within the set. |
23439 | The target schema version does not support kerberos proxy servers. |
23440 | The main mode crypto set ID should be the global main mode crypto set ID. |
23441 | The target schema version does not support one of the main mode encryption algorithms chosen. |
23442 | The target schema version does not support one of the main mode hash algorithms chosen. |
23443 | The target schema version does not support one of the main mode key exchange algorithms chosen. |
23444 | The target schema version does not support one of the quick mode encryption algorithms chosen. |
23445 | The target schema version does not support one of the quick mode hash algorithms chosen. |
23446 | The target schema version does not support one of the quick mode key exchange algorithms chosen. |
23447 | The encryption and hash algorithms specified are incompatible. |
23448 | Malformed query: Mismatch in the number of ORed terms and the terms array |
23449 | Malformed query: Mismatch in the number of ANDed conditions and conditions array |
23450 | Malformed query: Invalid confition match key |
23451 | Malformed query: Invalid condition match type |
23452 | Malformed query: Invalid condition data type |
23453 | Malformed query: Invalid key and data type combination |
23454 | Malformed query: Protocol condition present without a protocol condition |
23455 | Malformed query: Profile Key unavailable for this object type queried |
23456 | Malformed query: Status Key unavailable for this object type queried |
23457 | Malformed query: FilterID Key unavailable for this object type queried |
23458 | Malformed query: Application Key unavailable for this object type queried |
23459 | Malformed query: Protocol Key unavailable for this object type queried |
23460 | Malformed query: Local Port Key unavailable for this object type queried |
23461 | Malformed query: Remote Port Key unavailable for this object type queried |
23462 | Malformed query: Service Name Key unavailable for this object type queried |
23463 | Authentication (No Encapsulation) may not be used on tunnel-mode rules. |
23464 | Authentication (No Encapsulation) may not be used on rules that contain preshared keys. |
23465 | A runtime error occurred while trying to enforce the rule. |
23466 | The main mode cryptographic set was not found. |
23467 | The target schema version does not support local only mapping. |
23468 | The key module in the rule is incompatible with the authentication methods specified in the associated authentication sets. |
23469 | The target schema version does not support Security Realm flag. |
23470 | Firewall Rules with security realm Id field would require authentication and encryption, and action should be Allow. |
23471 | A string for the security realm Id is invalid. |
23472 | The target schema version does not support security realm Id. |
23500 | mpssvc |
23501 | Microsoft Corporation |
23502 | Microsoft Windows Firewall Provider |
23503 | Windows Firewall Static Session |
23504 | Windows Firewall Dynamic Session |
23505 | Boot Time Filter |
23506 | This filter is in effect before the service starts. |
23507 | Logging Filter |
23508 | This filter implements logging, if configured. |
23509 | Port Scanning Prevention Filter |
23510 | This filter prevents port scanning. This many times means there are no listeners. If debugging ensure your scenario has one. |
23511 | Loopback Permit Filter |
23512 | This filter permits loopback traffic. |
23513 | Secondary Connections Filter |
23514 | This filter permits secondary connections for FTP protocols. |
23515 | Deep Protocol Inspection Filter |
23516 | This filter implements deep inspection for FTP protocols. |
23517 | FTP Inspection Filter |
23518 | This filter enables inspection of FTP. |
23521 | Microsoft Corporation |
23522 | Microsoft Windows Firewall IPsec Provider |
23523 | State Management Filter |
23524 | Indicates different options to WFP to allow customization of state creation. |
23525 | State Management Provider Context |
23526 | Contains State Management Options |
23527 | Security Realm Id Provider Context |
23528 | Contains Security Realm Id |
23529 | Interface to Bind Provider Context |
23530 | Contains The Interface Id to Bind to |
23831 | UPnP Framework (TCP-In) |
23832 | Inbound rule for UPnP Framework traffic [TCP] |
23833 | UPnP Framework (TCP-Out) |
23834 | Outbound rule for UPnP Framework traffic [TCP] |
23835 | UPnP Framework (UDP-In) |
23836 | Inbound rule for UPnP Framework traffic [UDP] |
23837 | UPnP Framework (UDP-Out) |
23838 | Outbound rule for UPnP Framework traffic [UDP] |
24000 | Windows Firewall with Advanced Security |
24001 | Configure policies that provide enhanced network security for Windows computers. |
25000 | Core Networking |
25001 | Core Networking - Packet Too Big (ICMPv6-In) |
25002 | Core Networking - Packet Too Big (ICMPv6-Out) |
25007 | Packet Too Big error messages are sent from any node that a packet traverses which is unable to forward the packet because the packet is too large for the next link. |
25008 | Core Networking - Router Solicitation (ICMPv6-Out) |
25009 | Core Networking - Router Solicitation (ICMPv6-In) |
25011 | Router Solicitation messages are sent by nodes seeking routers to provide stateless auto-configuration. |
25012 | Core Networking - Router Advertisement (ICMPv6-In) |
25013 | Core Networking - Router Advertisement (ICMPv6-Out) |
25018 | Router Advertisement messages are sent by routers to other nodes for stateless auto-configuration. |
25019 | Core Networking - Neighbor Discovery Solicitation (ICMPv6-In) |
25020 | Core Networking - Neighbor Discovery Solicitation (ICMPv6-Out) |
25025 | Neighbor Discovery Solicitations are sent by nodes to discover the link-layer address of another on-link IPv6 node. |
25026 | Core Networking - Neighbor Discovery Advertisement (ICMPv6-In) |
25027 | Core Networking - Neighbor Discovery Advertisement (ICMPv6-Out) |
25032 | Neighbor Discovery Advertisement messages are sent by nodes to notify other nodes of link-layer address changes or in response to a Neighbor Discovery Solicitation request. |
25033 | Core Networking - Inverse Neighbor Discovery Solicitation (ICMPv6-In) |
25034 | Core Networking - Inverse Neighbor Discovery Solicitation (ICMPv6-Out) |
25039 | Inverse Neighbor Discovery Solicitations are sent by nodes to discover the IP address of another IPv6 node given its link-layer address. |
25040 | Core Networking - Inverse Neighbor Discovery Advertisement (ICMPv6-In) |
25041 | Core Networking - Inverse Neighbor Discovery Advertisement (ICMPv6-Out) |
25046 | Inverse Neighbor Discovery Solicitations are sent by nodes to notify other nodes of IP address changes or in response to an Inverse Neighbor Discovery Solicitation request. |
25047 | Core Networking - Certificate Path Solicitation (ICMPv6-In) |
25048 | Core Networking - Certificate Path Solicitation (ICMPv6-Out) |
25053 | SEND - Secure Neighbor Discovery - Certificate Path Solicitation is a secure version of Neighbor Discovery Solicitation. |
25054 | Core Networking - Certificate Path Advertisement (ICMPv6-In) |
25055 | Core Networking - Certificate Path Advertisement (ICMPv6-Out) |
25060 | SEND - Secure Neighbor Discovery - Certificate Path Advertisement is a secure version of Neighbor Discovery Advertisement. |
25061 | Core Networking - Multicast Listener Query (ICMPv6-In) |
25062 | Core Networking - Multicast Listener Query (ICMPv6-Out) |
25067 | An IPv6 multicast-capable router uses the Multicast Listener Query message to query a link for multicast group membership. |
25068 | Core Networking - Multicast Listener Report (ICMPv6-In) |
25069 | Core Networking - Multicast Listener Report (ICMPv6-Out) |
25074 | The Multicast Listener Report message is used by a listening node to either immediately report its interest in receiving multicast traffic at a specific multicast address or in response to a Multicast Listener Query. |
25075 | Core Networking - Multicast Listener Report v2 (ICMPv6-In) |
25076 | Core Networking - Multicast Listener Report v2 (ICMPv6-Out) |
25081 | Multicast Listener Report v2 message is used by a listening node to either immediately report its interest in receiving multicast traffic at a specific multicast address or in response to a Multicast Listener Query. |
25082 | Core Networking - Multicast Listener Done (ICMPv6-In) |
25083 | Core Networking - Multicast Listener Done (ICMPv6-Out) |
25088 | Multicast Listener Done messages inform local routers that there are no longer any members remaining for a specific multicast address on the subnet. |
25089 | Core Networking - Multicast Router Advertisement (ICMPv6-In) |
25090 | Core Networking - Multicast Router Advertisement (ICMPv6-Out) |
25095 | Multicast Router Advertisement messages are sent by routers to advertise that IP multicast forwarding is enabled. |
25096 | Core Networking - Multicast Router Solicitation (ICMPv6-In) |
25097 | Core Networking - Multicast Router Solicitation (ICMPv6-Out) |
25102 | Multicast Router Solicitation messages are sent in order to discover routers with IP multicast forwarding enabled. |
25103 | Core Networking - Multicast Router Termination (ICMPv6-In) |
25104 | Core Networking - Multicast Router Termination (ICMPv6-Out) |
25109 | Multicast Router Termination messages are sent when a router stops IP multicast routing functions on an interface. |
25110 | Core Networking - Destination Unreachable (ICMPv6-In) |
25111 | Core Networking - Destination Unreachable (ICMPv6-Out) |
25112 | Destination Unreachable error messages are sent from any node that a packet traverses which is unable to forward the packet for any reason except congestion. |
25113 | Core Networking - Time Exceeded (ICMPv6-In) |
25114 | Core Networking - Time Exceeded (ICMPv6-Out) |
25115 | Time Exceeded error messages are generated from any node that a packet traverses if the Hop Limit value is decremented to zero at any point on the path. |
25116 | Core Networking - Parameter Problem (ICMPv6-In) |
25117 | Core Networking - Parameter Problem (ICMPv6-Out) |
25118 | Parameter Problem error messages are sent by nodes as a result of incorrectly generated packets. |
25251 | Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-In) |
25252 | Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-Out) |
25257 | Destination Unreachable Fragmentation Needed error messages are sent from any node that a packet traverses which is unable to forward the packet because fragmentation was needed and the don’t fragment bit was set. |
25301 | Core Networking - Dynamic Host Configuration Protocol (DHCP-In) |
25302 | Core Networking - Dynamic Host Configuration Protocol (DHCP-Out) |
25303 | Allows DHCP (Dynamic Host Configuration Protocol) messages for stateful auto-configuration. |
25304 | Core Networking - Dynamic Host Configuration Protocol for IPv6(DHCPV6-In) |
25305 | Core Networking - Dynamic Host Configuration Protocol for IPv6(DHCPV6-Out) |
25306 | Allows DHCPV6 (Dynamic Host Configuration Protocol for IPv6) messages for stateful and stateless configuration. |
25326 | Core Networking - Teredo (UDP-In) |
25327 | Core Networking - Teredo (UDP-Out) |
25332 | Inbound UDP rule to allow Teredo edge traversal, a technology that provides address assignment and automatic tunneling for unicast IPv6 traffic when an IPv6/IPv4 host is located behind an IPv4 network address translator. |
25333 | Outbound UDP rule to allow Teredo edge traversal, a technology that provides address assignment and automatic tunneling for unicast IPv6 traffic when an IPv6/IPv4 host is located behind an IPv4 network address translator. |
25351 | Core Networking - IPv6 (IPv6-In) |
25352 | Core Networking - IPv6 (IPv6-Out) |
25357 | Inbound rule required to permit IPv6 traffic for ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) and 6to4 tunneling services. |
25358 | Outbound rule required to permit IPv6 traffic for ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) and 6to4 tunneling services. |
25376 | Core Networking - Internet Group Management Protocol (IGMP-In) |
25377 | Core Networking - Internet Group Management Protocol (IGMP-Out) |
25382 | IGMP messages are sent and received by nodes to create, join and depart multicast groups. |
25401 | Core Networking - Group Policy (NP-Out) |
25402 | Outbound rule to allow SMB traffic for Group Policy updates. [TCP 445] |
25403 | Core Networking - Group Policy (TCP-Out) |
25404 | Outbound rule to allow remote RPC traffic for Group Policy updates. [TCP] |
25405 | Core Networking - DNS (UDP-Out) |
25406 | Outbound rule to allow DNS requests. DNS responses based on requests that matched this rule will be permitted regardless of source address. This behavior is classified as loose source mapping. [LSM] [UDP 53] |
25407 | Core Networking - Group Policy (LSASS-Out) |
25408 | Outbound rule to allow remote LSASS traffic for Group Policy updates [TCP]. |
25426 | Core Networking - IPHTTPS (TCP-In) |
25427 | Core Networking - IPHTTPS (TCP-Out) |
25428 | Inbound TCP rule to allow IPHTTPS tunneling technology to provide connectivity across HTTP proxies and firewalls. |
25429 | Outbound TCP rule to allow IPHTTPS tunneling technology to provide connectivity across HTTP proxies and firewalls. |
26008 | Networking - Destination Unreachable (ICMPv4-In) |
26009 | Networking - Destination Unreachable (ICMPv4-Out) |
26014 | Destination Unreachable error messages are sent from any node that a packet traverses which is unable to forward the packet for any reason except congestion. |
26015 | Networking - Source Quench (ICMPv4-In) |
26016 | Networking - Source Quench (ICMPv4-Out) |
26021 | Source Quench messages are sent from any node that a packet traverses which discards the datagram because they are arriving too fast or there are buffering issues. |
26022 | Networking - Redirect (ICMPv4-In) |
26023 | Networking - Redirect (ICMPv4-Out) |
26028 | Redirect messages are sent to indicate that the node which the packet was sent to is no longer the best gateway to reach the network in question. |
26036 | Networking - Time Exceeded (ICMPv4-In) |
26037 | Networking - Time Exceeded (ICMPv4-Out) |
26042 | Time Exceeded error messages are generated from any node which a packet traverses if the Hop Limit value is decremented to zero at any point on the path. |
26043 | Networking - Timestamp Request (ICMPv4-In) |
26044 | Networking - Timestamp Request (ICMPv4-Out) |
26049 | Timestamp Request messages are sent by nodes who wish to obtain the current timestamp from another node. |
26057 | Networking - Parameter Problem (ICMPv4-In) |
26058 | Networking - Parameter Problem (ICMPv4-Out) |
26063 | Parameter Problem error messages are sent by nodes as a result of incorrectly generated packets. |
26078 | Networking - Redirect (ICMPv6-In) |
26079 | Networking - Redirect (ICMPv6-Out) |
26084 | Redirect messages are sent to indicate that the node which the packet was sent to is no longer the best gateway to reach the network in question. |
26106 | Networking - Router Solicitation (ICMPv6-In) |
26109 | Router Solicitation messages are sent by nodes seeking routers to provide stateless auto-configuration. |
26117 | Networking - Generic Routing Encapsulation (GRE-In) |
26118 | Networking - Generic Routing Encapsulation (GRE-Out) |
26123 | Generic Routing Encapsulation is used for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. |
26124 | Networking - PGM Reliable Transport Protocol (PGM-In) |
26125 | Networking - PGM Reliable Transport Protocol (PGM-Out) |
26130 | Pragmatic General Multicast is a reliable multicast transport protocol used for applications that require ordered or unordered, duplicate-free, multicast data delivery from multiple sources to multiple receivers. |
26131 | Networking - Packet Too Big (ICMPv4-In) |
26132 | Networking - Packet Too Big (ICMPv4-Out) |
26133 | Packet Too Big error messages are sent from any node that a packet traverses which is unable to forward the packet because the packet is too large for the next link. |
26134 | Networking - Router Solicitation (ICMPv4-In) |
26135 | Networking - Router Solicitation (ICMPv4-Out) |
26136 | Router Solicitation messages are sent by nodes seeking routers to provide stateless auto-configuration. |
26137 | Networking - Address Mask Request (ICMPv4-In) |
26138 | Networking - Address Mask Request (ICMPv4-Out) |
26139 | Address Mask Request messages are sent by nodes who wish to obtain the subnet mask for their assigned address. |
26140 | Networking - Echo Request (ICMPv4-In) |
26141 | Networking - Echo Request (ICMPv4-Out) |
26142 | Networking - Echo Request (ICMPv6-In) |
26143 | Networking - Echo Request (ICMPv6-Out) |
26144 | Echo Request messages are sent as ping requests to other nodes. |
28002 | Key Management Service |
28003 | Key Management Service (TCP-In) |
28006 | Inbound rule for the Key Management Service to allow for machine counting and license compliance. [TCP 1688] |
28252 | BITS Peercaching |
28254 | BITS Peercaching (WSD-In) |
28257 | Inbound rule for BITS Peercaching to discover neighbors who may have content via WSDAPI. [UDP 3702] |
28258 | BITS Peercaching (WSD-Out) |
28261 | Outbound rule for BITS Peercaching to discover neighbors who may have content via WSDAPI. [UDP 3702] |
28262 | BITS Peercaching (Content-In) |
28265 | Inbound rule for BITS Peercaching content transfer port. [TCP 2178] |
28266 | BITS Peercaching (Content-Out) |
28269 | Outbound rule for BITS Peercaching content transfer port. [TCP 2178] |
28270 | BITS Peercaching (RPC) |
28273 | Inbound rule for the Peercaching authorization exchange port via dynamic RPC/TCP. |
28274 | BITS Peercaching (RPC-EPMAP) |
28277 | Inbound rule for the RPCSS service in order to allow RPC/TCP traffic for BITS Peercaching. |
28502 | File and Printer Sharing |
28503 | File and Printer Sharing (NB-Session-In) |
28506 | Inbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139] |
28507 | File and Printer Sharing (NB-Session-Out) |
28510 | Outbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139] |
28511 | File and Printer Sharing (SMB-In) |
28514 | Inbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP 445] |
28515 | File and Printer Sharing (SMB-Out) |
28518 | Outbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP 445] |
28519 | File and Printer Sharing (NB-Name-In) |
28522 | Inbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137] |
28523 | File and Printer Sharing (NB-Name-Out) |
28526 | Outbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137] |
28527 | File and Printer Sharing (NB-Datagram-In) |
28530 | Inbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP 138] |
28531 | File and Printer Sharing (NB-Datagram-Out) |
28534 | Outbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP 138] |
28535 | File and Printer Sharing (Spooler Service - RPC) |
28538 | Inbound rule for File and Printer Sharing to allow the Print Spooler Service to communicate via TCP/RPC. |
28539 | File and Printer Sharing (Spooler Service - RPC-EPMAP) |
28542 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Spooler Service. |
28543 | File and Printer Sharing (Echo Request - ICMPv4-In) |
28544 | File and Printer Sharing (Echo Request - ICMPv4-Out) |
28545 | File and Printer Sharing (Echo Request - ICMPv6-In) |
28546 | File and Printer Sharing (Echo Request - ICMPv6-Out) |
28547 | Echo Request messages are sent as ping requests to other nodes. |
28548 | File and Printer Sharing (LLMNR-UDP-In) |
28549 | Inbound rule for File and Printer Sharing to allow Link Local Multicast Name Resolution. [UDP 5355] |
28550 | File and Printer Sharing (LLMNR-UDP-Out) |
28551 | Outbound rule for File and Printer Sharing to allow Link Local Multicast Name Resolution. [UDP 5355] |
28602 | File and Printer Sharing over SMBDirect |
28603 | File and Printer Sharing over SMBDirect (iWARP-In) |
28606 | Inbound rule for File and Printer Sharing over SMBDirect to allow iWARP [TCP 5445] |
28752 | Remote Desktop |
28753 | Remote Desktop (TCP-In) |
28756 | Inbound rule for the Remote Desktop service to allow RDP traffic. [TCP 3389] |
28757 | RemoteApp and Desktop Connection Management - WMI (TCP-In) |
28758 | Inbound rule for WMI management of RemoteApp and Desktop Connection Management |
28759 | RemoteApp and Desktop Connection Management - WMI (DCOM-In) |
28760 | Inbound rule to allow DCOM traffic for remote WMI management of RemoteApp and Desktop Connection Management. [TCP 135] |
28761 | RemoteApp and Desktop Connection Management - WMI (TCP-Out) |
28762 | Outbound rule for WMI management of RemoteApp and Desktop Connection Management |
28763 | RemoteApp and Desktop Connection Management - WMI (Async-TCP-In) |
28764 | Inbound rule for asynchronous WMI management of RemoteApp and Desktop Connection Management |
28765 | RemoteApp and Desktop Connection Management (RPC) |
28766 | Inbound rule to allow RemoteApp and Desktop Connection Management to be remotely managed via RPC/TCP traffic |
28767 | Remote Desktop Web Access - WMI (Async-TCP-In) |
28768 | Inbound rule for asynchronous WMI management of Remote Desktop Web Access |
28769 | Remote Desktop Web Access - WMI (DCOM-In) |
28770 | Inbound rule to allow DCOM traffic for remote WMI management of Remote Desktop Web Access |
28771 | Remote Desktop Web Access - WMI (TCP-In) |
28772 | Inbound rule for WMI management of Remote Desktop Web Access |
28773 | Remote Desktop Web Access - WMI (TCP-Out) |
28774 | Outbound rule for WMI management of Remote Desktop Web Access |
28775 | Remote Desktop - User Mode (TCP-In) |
28776 | Remote Desktop - User Mode (UDP-In) |
28777 | Inbound rule for the Remote Desktop service to allow RDP traffic. [UDP 3389] |
28778 | Remote Desktop - Shadow (TCP-In) |
28779 | Inbound rule for the Remote Desktop service to allow shadowing of an existing Remote Desktop session. (TCP-In) |
29002 | iSCSI Service |
29003 | iSCSI Service (TCP-In) |
29006 | Inbound rule for the iSCSI Service to allow communications with an iSCSI server or device. [TCP] |
29007 | iSCSI Service (TCP-Out) |
29010 | Outbound rule for the iSCSI Service to allow communications with an iSCSI server or device. [TCP] |
29252 | Remote Event Log Management |
29253 | Remote Event Log Management (RPC) |
29256 | Inbound rule for the local Event Log service to be remotely managed via RPC/TCP. |
29257 | Remote Event Log Management (NP-In) |
29260 | Inbound rule for the local Event Log service to be remotely managed over Named Pipes. |
29265 | Remote Event Log Management (RPC-EPMAP) |
29268 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for the local Event Log Service. |
29502 | Remote Service Management |
29503 | Remote Service Management (RPC) |
29506 | Inbound rule for the local Service Control Manager to be remotely managed via RPC/TCP. |
29507 | Remote Service Management (NP-In) |
29510 | Inbound rule for the local Service Control Manager to be remotely managed over Named Pipes. |
29515 | Remote Service Management (RPC-EPMAP) |
29518 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for the local Service Control Manager. |
29752 | Remote Administration |
29753 | Remote Administration (RPC) |
29756 | Inbound rule for all services to be remotely managed via RPC/TCP. |
29757 | Remote Administration (NP-In) |
29760 | Inbound rule for all services to be remotely managed over Named Pipes. |
29765 | Remote Administration (RPC-EPMAP) |
29768 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for all the local services. |
30002 | Windows Firewall Remote Management |
30003 | Windows Firewall Remote Management (RPC) |
30006 | Inbound rule for the Windows Firewall to be remotely managed via RPC/TCP. |
30007 | Windows Firewall Remote Management (RPC-EPMAP) |
30010 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Windows Firewall. |
30252 | Windows Remote Management (Compatibility) |
30253 | Windows Remote Management (HTTP-In) |
30256 | Inbound rule for Windows Remote Management via WS-Management. [TCP 5985] |
30267 | Windows Remote Management |
30502 | Wireless Portable Devices |
30503 | Wireless Portable Devices (TCP-Out) |
30506 | Outbound rule for Wireless Portable Devices to allow use of the Usermode Driver Framework. [TCP] |
30507 | Wireless Portable Devices (SSDP-In) |
30510 | Inbound rule for Wireless Portable Devices to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
30511 | Wireless Portable Devices (SSDP-Out) |
30514 | Outbound rule for Wireless Portable Devices to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
30515 | Wireless Portable Devices (UPnP-In) |
30518 | Inbound rule for Wireless Portable Devices to allow use of Universal Plug and Play. [TCP 2869] |
30519 | Wireless Portable Devices (UPnP-Out) |
30522 | Outbound rule for Wireless Portable Devices to allow use of Universal Plug and Play. [TCP] |
30523 | Wireless Portable Devices (UPnPHost-Out) |
30524 | Outbound rule for Wireless Portable Devices to allow use of Universal Plug and Play. [TCP] |
30752 | Media Center Extenders |
30753 | Media Center Extenders - SSDP (UDP-In) |
30756 | Inbound rule for Media Center Extenders to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
30757 | Media Center Extenders - SSDP (UDP-Out) |
30760 | Outbound rule for Media Center Extenders to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
30761 | Media Center Extenders - RTSP (TCP-In) |
30764 | Inbound rule for Media Center Extenders to allow RTSP AV Control. [TCP 554, TCP 8554-8558] |
30765 | Media Center Extenders - RTSP (TCP-Out) |
30768 | Outbound rule for Media Center Extenders to allow WMDRM-ND and RTSP AV Control. [TCP] |
30769 | Media Center Extenders - qWave (UDP-In) |
30772 | Inbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
30773 | Media Center Extenders - qWave (UDP-Out) |
30776 | Outbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
30777 | Media Center Extenders - qWave (TCP-In) |
30780 | Inbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
30781 | Media Center Extenders - qWave (TCP-Out) |
30784 | Outbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
30785 | Media Center Extenders - HTTP Streaming (TCP-In) |
30788 | Inbound rule for Media Center Extenders to allow HTTP Media Streaming. [TCP 10244] |
30793 | Media Center Extenders - XSP (TCP-In) |
30796 | Inbound rule for Media Center Extenders to allow terminal sessions. [TCP 3390] |
30801 | Media Center Extenders - WMDRM-ND/RTP/RTCP (UDP-In) |
30804 | Inbound rule for Media Center Extenders to allow WMDRM-ND and RTP/RTCP AV Streaming. [UDP 7777-7781, UDP 5004-5005, UDP 50004-50013] |
30805 | Media Center Extenders - WMDRM-ND/RTP/RTCP (UDP-Out) |
30808 | Outbound rule for Media Center Extenders to allow WMDRM-ND and RTP/RTCP AV Streaming. [UDP] |
30810 | Media Center Extenders - Service (TCP-Out) |
30811 | Outbound rule for Media Center Extenders to allow extender devices to locate and connect to the computer. [TCP] |
30812 | Media Center Extenders - Device Provisioning (TCP-Out) |
30813 | Outbound rule for Media Center Extenders to allow traffic for Device Provisioning. [TCP] |
30814 | Media Center Extenders - Media Streaming (TCP-In) |
30815 | Inbound rule for Media Center Extenders to allow UPnP traffic for Media Streaming. [TCP 2869] |
30816 | Media Center Extenders - Media Streaming (TCP-Out) |
30817 | Outbound rule for Media Center Extenders to allow UPnP traffic for Media Streaming. [TCP] |
30818 | Media Center Extenders - Device Validation (TCP-Out) |
30819 | Outbound rule for Media Center Extenders to allow traffic for Device Validation. [TCP] |
30820 | Media Center Extenders - Media Streaming (UDP-Out) |
30821 | Outbound rule for Media Center Extenders to allow Media Streaming devices to respond to an SSDP search. [UDP 1900] |
30822 | Media Center Extenders - UPnP (TCP-Out) |
30823 | Outbound rule for Media Center Extenders to allow UPnP devices to transmit device information. [TCP] |
31002 | Windows Media Player |
31003 | Windows Media Player (UDP-In) |
31006 | Inbound rule for Windows Media Player to allow UDP Media Streaming. [UDP] |
31007 | Windows Media Player (UDP-Out) |
31010 | Outbound rule for Windows Media Player to allow UDP Media Streaming. [UDP] |
31011 | Windows Media Player (TCP-Out) |
31014 | Outbound rule for Windows Media Player to allow TCP/HTTP Media Streaming. [TCP] |
31015 | Windows Media Player - Internet Group Management Protocol (IGMP-In) |
31018 | Inbound rule for Windows Media Player to allow IGMP messages. |
31019 | Windows Media Player - Internet Group Management Protocol (IGMP-Out) |
31022 | Outbound rule for Windows Media Player to allow IGMP messages. |
31023 | Windows Media Player x86 (UDP-In) |
31024 | Windows Media Player x86 (UDP-Out) |
31025 | Windows Media Player x86 (TCP-Out) |
31252 | Windows Media Player Network Sharing Service |
31253 | Windows Media Player Network Sharing Service (qWave-UDP-In) |
31256 | Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
31257 | Windows Media Player Network Sharing Service (qWave-UDP-Out) |
31260 | Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
31261 | Windows Media Player Network Sharing Service (qWave-TCP-In) |
31264 | Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
31265 | Windows Media Player Network Sharing Service (qWave-TCP-Out) |
31268 | Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
31269 | Windows Media Player Network Sharing Service (SSDP-In) |
31272 | Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
31273 | Windows Media Player Network Sharing Service (SSDP-Out) |
31276 | Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
31277 | Windows Media Player Network Sharing Service (UPnP-In) |
31280 | Inbound rule for the Windows Media Player Network Sharing Service to allow use of Universal Plug and Play. [TCP 2869] |
31281 | Windows Media Player Network Sharing Service (UPnP-Out) |
31284 | Outbound rule for the Windows Media Player Network Sharing Service to allow use of Universal Plug and Play. [TCP] |
31285 | Windows Media Player Network Sharing Service (HTTP-Streaming-In) |
31288 | Inbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10243] |
31289 | Windows Media Player Network Sharing Service (HTTP-Streaming-Out) |
31292 | Outbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10243] |
31293 | Windows Media Player Network Sharing Service (Streaming-UDP-In) |
31296 | Inbound rule for Windows Media Player to allow UDP Media Streaming. [UDP] |
31297 | Windows Media Player Network Sharing Service (Streaming-UDP-Out) |
31300 | Outbound rule for Windows Media Player to allow UDP Media Streaming. [UDP] |
31301 | Windows Media Player Network Sharing Service (Streaming-TCP-Out) |
31304 | Outbound rule for Windows Media Player to allow TCP/HTTP Media Streaming. [TCP] |
31305 | Windows Media Player Network Sharing Service (UDP-In) |
31308 | Inbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [UDP] |
31309 | Windows Media Player Network Sharing Service (UDP-Out) |
31312 | Outbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [UDP] |
31313 | Windows Media Player Network Sharing Service (TCP-In) |
31316 | Inbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [TCP] |
31317 | Windows Media Player Network Sharing Service (TCP-Out) |
31320 | Outbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [TCP] |
31321 | Windows Media Player Network Sharing Service (UPnPHost-Out) |
31322 | Outbound rule for the Windows Media Player Network Sharing Service to allow use of Universal Plug and Play. [TCP] |
31323 | Windows Media Player Network Sharing Service x86 (Streaming-UDP-In) |
31324 | Windows Media Player Network Sharing Service x86 (Streaming-UDP-Out) |
31325 | Windows Media Player Network Sharing Service x86 (Streaming-TCP-Out) |
31500 | Windows Media Player Network Sharing Service (Internet) |
31501 | Windows Media Player Network Sharing Service (HTTP-Streaming-In) |
31502 | Inbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10245] |
31700 | Windows Media Player Network Sharing Service service hardening - RTSP |
31701 | Allow incoming RTSP connections to the Windows Media Player Network Sharing Service |
31702 | Windows Media Player Network Sharing Service service hardening - Block any other incoming TCP traffic |
31752 | Connect to a Network Projector |
31753 | Connect to a Network Projector (WSD-In) |
31756 | Inbound rule for Connect to a Network Projector to discover devices via WSDAPI. [UDP 3702] |
31757 | Connect to a Network Projector (WSD-Out) |
31760 | Outbound rule for Connect to a Network Projector to discover devices via WSDAPI. [UDP 3702] |
31761 | Connect to a Network Projector (TCP-In) |
31764 | Inbound rule for Connect to a Network Projector to communicate with devices on the network. [TCP] |
31765 | Connect to a Network Projector (TCP-Out) |
31768 | Outbound rule for Connect to a Network Projector to communicate with devices on the network. [TCP] |
31769 | Connect to a Network Projector (WSD Events-In) |
31770 | Inbound rule for Connect to a Network Projector to allow WSDAPI Events Discovery. [TCP 5357] |
31771 | Connect to a Network Projector (WSD Events-Out) |
31772 | Outbound rule for Connect to a Network Projector to allow WSDAPI Events Discovery. [TCP 5358] |
31773 | Connect to a Network Projector (WSD EventsSecure-In) |
31774 | Inbound rule for Connect to a Network Projector to allow Secure WSDAPI Events. [TCP 5358] |
31775 | Connect to a Network Projector (WSD EventsSecure-Out) |
31776 | Outbound rule for Connect to a Network Projector to allow Secure WSDAPI Events. [TCP 5358] |
32002 | Windows Peer to Peer Collaboration Foundation |
32003 | Windows Peer to Peer Collaboration Foundation (TCP-In) |
32006 | Inbound rule for the Windows Peer to Peer Collaboration Foundation for Peer to Peer Communication. [TCP] |
32007 | Windows Peer to Peer Collaboration Foundation (TCP-Out) |
32010 | Outbound rule for the Windows Peer to Peer Collaboration Foundation for Peer to Peer Communication. [TCP] |
32011 | Windows Peer to Peer Collaboration Foundation (WSD-In) |
32014 | Inbound rule for the Windows Peer to Peer Collaboration Foundation to discover devices via WSDAPI. [UDP 3702] |
32015 | Windows Peer to Peer Collaboration Foundation (WSD-Out) |
32018 | Outbound rule for the Windows Peer to Peer Collaboration Foundation to discover devices via WSDAPI. [UDP 3702] |
32019 | Windows Peer to Peer Collaboration Foundation (PNRP-In) |
32022 | Inbound rule for the Windows Peer to Peer Collaboration Foundation to allow Peer Name Resolution. [UDP 3540] |
32023 | Windows Peer to Peer Collaboration Foundation (PNRP-Out) |
32026 | Outbound rule for the Windows Peer to Peer Collaboration Foundation to allow Peer Name Resolution. [UDP 3540] |
32027 | Windows Peer to Peer Collaboration Foundation (SSDP-In) |
32030 | Inbound rule for the Windows Peer to Peer Collaboration Foundation to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
32031 | Windows Peer to Peer Collaboration Foundation (SSDP-Out) |
32034 | Outbound rule for the Windows Peer to Peer Collaboration Foundation to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
32252 | Windows Meeting Space |
32253 | Windows Meeting Space (DFSR-In) |
32256 | Inbound rule for Windows Meeting Space to allow Distributed File System Replication traffic. [TCP 5722] |
32257 | Windows Meeting Space (DFSR-Out) |
32260 | Outbound rule for Windows Meeting Space to allow Distributed File System Replication traffic. [TCP 5722] |
32261 | Windows Meeting Space (TCP-In) |
32264 | Inbound rule for Windows Meeting Space to allow collaboration traffic. [TCP] |
32265 | Windows Meeting Space (TCP-Out) |
32268 | Outbound rule for Windows Meeting Space to allow collaboration traffic. [TCP] |
32269 | Windows Meeting Space (UDP-In) |
32272 | Inbound rule for Windows Meeting Space to allow collaboration traffic. [UDP] |
32273 | Windows Meeting Space (UDP-Out) |
32276 | Outbound rule for Windows Meeting Space to allow collaboration traffic. [UDP] |
32277 | Windows Meeting Space (P2P-In) |
32280 | Inbound rule for Windows Meeting Space to allow Peer Networking traffic. [TCP 3587] |
32281 | Windows Meeting Space (P2P-Out) |
32284 | Outbound rule for Windows Meeting Space to allow Peer Networking traffic. [TCP 3587] |
32752 | Network Discovery |
32753 | Network Discovery (SSDP-In) |
32756 | Inbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
32757 | Network Discovery (SSDP-Out) |
32760 | Outbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
32761 | Network Discovery (UPnP-In) |
32764 | Inbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP 2869] |
32765 | Network Discovery (UPnP-Out) |
32768 | Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP] |
32769 | Network Discovery (NB-Name-In) |
32772 | Inbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137] |
32773 | Network Discovery (NB-Name-Out) |
32776 | Outbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137] |
32777 | Network Discovery (NB-Datagram-In) |
32780 | Inbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138] |
32781 | Network Discovery (NB-Datagram-Out) |
32784 | Outbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138] |
32785 | Network Discovery (WSD-In) |
32788 | Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702] |
32789 | Network Discovery (WSD-Out) |
32792 | Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702] |
32801 | Network Discovery (LLMNR-UDP-In) |
32804 | Inbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355] |
32805 | Network Discovery (LLMNR-UDP-Out) |
32808 | Outbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355] |
32809 | Network Discovery (Pub-WSD-In) |
32810 | Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702] |
32811 | Network Discovery (Pub WSD-Out) |
32812 | Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702] |
32813 | Network Discovery (WSD EventsSecure-In) |
32814 | Inbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358] |
32815 | Network Discovery (WSD EventsSecure-Out) |
32816 | Outbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358] |
32817 | Network Discovery (WSD Events-In) |
32818 | Inbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357] |
32819 | Network Discovery (WSD Events-Out) |
32820 | Outbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357] |
32821 | Network Discovery (UPnPHost-Out) |
32822 | Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP] |
32825 | Network Discovery (WSD-In) |
32826 | Inbound rule for Network Discovery to discover devices via Device Association Framework. [UDP 3702] |
33002 | Remote Assistance |
33003 | Remote Assistance (TCP-In) |
33006 | Inbound rule for Remote Assistance traffic. [TCP] |
33007 | Remote Assistance (TCP-Out) |
33010 | Outbound rule for Remote Assistance traffic. [TCP] |
33011 | Remote Assistance (RA Server TCP-In) |
33014 | Inbound rule for Remote Assistance to allow offers for assistance. [TCP] |
33015 | Remote Assistance (RA Server TCP-Out) |
33018 | Outbound rule for Remote Assistance to allow offers for assistance. [TCP] |
33019 | Remote Assistance (SSDP UDP-In) |
33022 | Inbound rule for Remote Assistance to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
33023 | Remote Assistance (SSDP UDP-Out) |
33026 | Outbound rule for Remote Assistance to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
33027 | Remote Assistance (SSDP TCP-In) |
33030 | Inbound rule for Remote Assistance to allow use of Universal Plug and Play. [TCP 2869] |
33031 | Remote Assistance (SSDP TCP-Out) |
33034 | Outbound rule for Remote Assistance to allow use of Universal Plug and Play. [TCP] |
33035 | Remote Assistance (DCOM-In) |
33036 | Inbound rule for Remote Assistance to allow offers for assistance via DCOM. [TCP 135] |
33037 | Remote Assistance (PNRP-Out) |
33038 | Outbound rule for Remote Assistance to allow use of Peer Name Resolution Protocol. [UDP] |
33039 | Remote Assistance (PNRP-In) |
33040 | Inbound rule for Remote Assistance to allow use Peer Name Resolution Protocol. [UDP 3540] |
33252 | Remote Scheduled Tasks Management |
33253 | Remote Scheduled Tasks Management (RPC) |
33256 | Inbound rule for the Task Scheduler service to be remotely managed via RPC/TCP. |
33257 | Remote Scheduled Tasks Management (RPC-EPMAP) |
33260 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Task Scheduler service. |
33502 | Distributed Transaction Coordinator |
33503 | Distributed Transaction Coordinator (TCP-In) |
33506 | Inbound rule to allow traffic for the Distributed Transaction Coordinator. [TCP] |
33507 | Distributed Transaction Coordinator (TCP-Out) |
33510 | Outbound rule to allow traffic for the Distributed Transaction Coordinator. [TCP] |
33511 | Distributed Transaction Coordinator (RPC) |
33512 | Inbound rule for the Kernel Transaction Resource Manager for Distributed Transaction Coordinator service to be remotely managed via RPC/TCP. |
33513 | Distributed Transaction Coordinator (RPC-EPMAP) |
33514 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Kernel Transaction Resource Manager for Distributed Transaction Coordinator service. |
33752 | Routing and Remote Access |
33753 | Routing and Remote Access (L2TP-In) |
33756 | Inbound rule for RRAS to allow Layer 2 Tunnel Protocol traffic. [UDP 1701] |
33757 | Routing and Remote Access (L2TP-Out) |
33760 | Outbound rule for RRAS to allow Layer 2 Tunnel Protocol traffic. [UDP 1701] |
33761 | Routing and Remote Access (PPTP-Out) |
33764 | Outbound rule for RRAS to allow Point-to-Point Tunnel Protocol traffic. [TCP 1723] |
33765 | Routing and Remote Access (PPTP-In) |
33768 | Inbound rule for RRAS to allow Point-to-Point Tunnel Protocol traffic. [TCP 1723] |
33769 | Routing and Remote Access (GRE-In) |
33772 | Inbound rule for RRAS to allow Generic Routing Encapsulation Protocol traffic. |
33773 | Routing and Remote Access (GRE-Out) |
33776 | Outbound rule for RRAS to allow Generic Routing Encapsulation Protocol Traffic |
34002 | Windows Collaboration Computer Name Registration Service |
34003 | Windows Collaboration Computer Name Registration Service (PNRP-In) |
34004 | Inbound rule for the Windows Collaboration Computer Name Registration Service to allow Peer Name Resolution. [UDP 3540] |
34005 | Windows Collaboration Computer Name Registration Service (PNRP-Out) |
34006 | Outbound rule for the Windows Collaboration Computer Name Registration Service to allow Peer Name Resolution. [UDP 3540] |
34007 | Windows Collaboration Computer Name Registration Service (SSDP-In) |
34008 | Inbound rule for the Windows Collaboration Computer Name Registration Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
34009 | Windows Collaboration Computer Name Registration Service (SSDP-Out) |
34010 | Outbound rule for the Windows Collaboration Computer Name Registration Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] |
34251 | Windows Management Instrumentation (WMI) |
34252 | Windows Management Instrumentation (DCOM-In) |
34253 | Inbound rule to allow DCOM traffic for remote Windows Management Instrumentation. [TCP 135] |
34254 | Windows Management Instrumentation (WMI-In) |
34255 | Inbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP] |
34256 | Windows Management Instrumentation (ASync-In) |
34257 | Inbound rule to allow Asynchronous WMI traffic for remote Windows Management Instrumentation. [TCP] |
34258 | Windows Management Instrumentation (WMI-Out) |
34259 | Outbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP] |
34501 | Remote Volume Management |
34502 | Remote Volume Management - Virtual Disk Service (RPC) |
34503 | Inbound rule for the Remote Volume Management - Virtual Disk Service to be remotely managed via RPC/TCP. |
34504 | Remote Volume Management - Virtual Disk Service Loader (RPC) |
34505 | Inbound rule for the Remote Volume Management - Virtual Disk Service Loader to be remotely managed via RPC/TCP. |
34506 | Remote Volume Management (RPC-EPMAP) |
34507 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for Remote Volume Management. |
34752 | Performance Logs and Alerts |
34753 | Performance Logs and Alerts (TCP-In) |
34754 | Inbound rule for Performance Logs and Alerts traffic. [TCP-In] |
34755 | Performance Logs and Alerts (DCOM-In) |
34756 | Inbound rule for Performance Logs and Alerts to allow remote DCOM activation. [TCP-135] |
35000 | The firewall rules that are part of Core Networking are required for reliable IPv4 and IPv6 connectivity. |
35001 | Windows Remote Management - Compatibility Mode (HTTP-In) |
35002 | Compatibility mode inbound rule for Windows Remote Management via WS-Management. [TCP 80] |
36001 | Cast to Device functionality |
36002 | Cast to Device streaming server (HTTP-Streaming-In) |
36003 | Inbound rule for the Cast to Device server to allow streaming using HTTP. [TCP 10246] |
36004 | Cast to Device streaming server (RTCP-Streaming-In) |
36005 | Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [UDP] |
36006 | Cast to Device streaming server (RTP-Streaming-Out) |
36007 | Outbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [UDP] |
36008 | Cast to Device streaming server (RTSP-Streaming-In) |
36009 | Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [TCP 23554, 23555, 23556] |
36010 | Cast to Device functionality (qWave-UDP-In) |
36011 | Inbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
36012 | Cast to Device functionality (qWave-UDP-Out) |
36013 | Outbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] |
36014 | Cast to Device functionality (qWave-TCP-In) |
36015 | Inbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
36016 | Cast to Device functionality (qWave-TCP-Out) |
36017 | Outbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] |
36100 | Cast to Device streaming server hardening rules for RTSP |
36101 | Allow incoming RTSP connections to the Cast to Device streaming server |
36102 | Cast to Device streaming server hardening - Block incoming TCP traffic |
36103 | Cast to Devicestreaming server hardening - Block outgoing TCP traffic |
36104 | Cast to Device SSDP Discovery (UDP-In) |
36105 | Inbound rule to allow discovery of Cast to Device targets using SSDP |
36106 | Cast to Device UPnP Events (TCP-In) |
36107 | Inbound rule to allow receiving UPnP Events from Cast to Device targets |
36251 | Proximity Sharing |
36252 | Proximity sharing over TCP (TCP sharing-In) |
36253 | Inbound rule for Proximity sharing over TCP |
36254 | Proximity sharing over TCP (TCP sharing-Out) |
36255 | Outbound rule for Proximity sharing over TCP |
36501 | TPM Virtual Smart Card Management |
36502 | TPM Virtual Smart Card Management (DCOM-In) |
36503 | Inbound rule for remote TPM Virtual Smart Card Management to allow DCOM activation. [TCP 135] |
36504 | TPM Virtual Smart Card Management (TCP-In) |
36505 | Inbound rule for remote TPM Virtual Smart Card Management traffic. [TCP] |
36506 | TPM Virtual Smart Card Management (TCP-Out) |
36507 | Outbound rule for remote TPM Virtual Smart Card Management traffic. [TCP] |
36751 | Remote Shutdown |
36753 | Inbound Rule for Remote Shutdown (TCP-In) |
36754 | Inbound rule for the Remote Shutdown via dynamic RPC/TCP. |
36755 | Inbound Rule for Remote Shutdown (RPC-EP-In) |
36756 | Inbound rule for the RPCSS service to allow RPC/TCP traffic |
36801 | Remote Event Monitor |
36802 | Remote Event Monitor (RPC) |
36803 | Inbound rule for remote event monitoring via RPC/TCP. |
36804 | Remote Event Monitor (RPC-EPMAP) |
36805 | Inbound rule for the RPCSS service to allow RPC/TCP traffic for remote event monitoring. |
36851 | Wi-Fi Direct Network Discovery |
36852 | Wi-Fi Direct Network Discovery (In) |
36853 | Inbound rule to discover WSD devices on Wi-Fi Direct networks. |
36854 | Wi-Fi Direct Network Discovery (Out) |
36855 | Outbound rule to discover WSD devices on Wi-Fi Direct networks. |
36856 | Wi-Fi Direct Spooler Use (In) |
36857 | Inbound rule to use WSD printers on Wi-Fi Direct networks. |
36858 | Wi-Fi Direct Spooler Use (Out) |
36859 | Outbound rule to use WSD printers on Wi-Fi Direct networks. |
36860 | Wi-Fi Direct Scan Service Use (In) |
36861 | Inbound rule to use WSD scanners on Wi-Fi Direct networks. |
36862 | Wi-Fi Direct Scan Service Use (Out) |
36863 | Outbound rule to use WSD scanners on Wi-Fi Direct networks. |
36902 | Software Load Balancer |
36903 | Software Load Balancer Multiplexer (TCP-In) |
36904 | The Software Load Balancer Multiplexer enables TCP communication to the Network Controller. [TCP] |
37002 | AllJoyn Router |
37003 | AllJoyn Router (TCP-In) |
37004 | Inbound rule for AllJoyn Router traffic [TCP] |
37005 | AllJoyn Router (TCP-Out) |
37006 | Outbound rule for AllJoyn Router traffic [TCP] |
37007 | AllJoyn Router (UDP-In) |
37008 | Inbound rule for AllJoyn Router traffic [UDP] |
37009 | AllJoyn Router (UDP-Out) |
37010 | Outbound rule for AllJoyn Router traffic [UDP] |
37101 | DIAL protocol server |
37102 | DIAL protocol server (HTTP-In) |
37103 | Inbound rule for DIAL protocol server to allow remote control of Apps using HTTP. [TCP 10247] |
37202 | XBox SystemOS |
37203 | XBox SRA Inbound rule Telnet Guest [TCP] |
37204 | XBox SRA Inbound rule for allowed Telnet Guest TCP traffic |
37205 | XBox SRA Inbound rule Telnet Guest [TCP] |
37206 | XBox SRA Inbound rule for allowed Telnet Guest TCP traffic |
37207 | XBox SRA Inbound rule RPC Endpoint Mapper [TCP] |
37208 | XBox SRA Inbound rule for prohibited RPC Endpoint Mapper TCP traffic |
37209 | XBox SRA Inbound rule Echo Request [ICMPv4] |
37210 | XBox SRA Inbound rule for allowed ICMP Echo Request traffic |
37211 | XBox SRA Outbound rule ICMPv4 Echo Request |
37212 | XBox SRA Outbound rule for allowed ICMPv4 Echo Request traffic |
38002 | This feature is used for machine counting and license compliance in enterprise environments. |
38252 | This feature allows Background Intelligent Transfer Service (BITS) clients that are in the same subnet to locate and share files that are stored in the BITS cache. (Uses WSDAPI and RPC) |
38502 | This feature is used for sharing local files and printers with other users on the network. (Uses NetBIOS, LLMNR, SMB and RPC) |
38602 | This feature is used for sharing local files over RDMA using the SMBDirect protocol. (Uses RDMA) |
38752 | This feature is used for accessing the desktop from a remote system. |
39002 | This feature is used for connecting to iSCSI target servers and devices. |
39252 | This feature allows remote viewing and management of the local event log. (Uses Named Pipes and RPC) |
39502 | This feature allows remote management of local services. (Uses Named Pipes and RPC) |
39752 | The feature allows remotely manageable services to receive RPC traffic. (Uses Named Pipes and RPC) |
40002 | This feature allows remote management of the local Windows Firewall. (Uses RPC) |
40252 | This feature allows remote management of the system via WS-Management, a web services-based protocol for remote management of operating systems and devices. |
40267 | This feature allows remote management of the system via WS-Management, a web services-based protocol for remote management of operating systems and devices. |
40502 | This feature allows the transfer of media from your network enabled camera or media device to your computer using the Media Transfer Protocol (MTP). (Uses UPnP and SSDP) |
40752 | This feature allows Media Center Extenders to communicate with a computer running Windows Media Center. (Uses SSDP and qWave) |
41002 | This feature allows users to receive streaming media over UDP. |
41252 | This feature enables users to share media over a network. (Uses UPnP, SSDP and qWave) |
41500 | This feature allows users to share out home media over the Internet |
41752 | This feature enables users to connect to projectors over wired or wireless networks to project presentations. (Uses WSDAPI) |
42002 | This feature is required to enable various peer-to-peer programs and technologies. (Uses SSDP and PNRP) |
42252 | This feature is used for collaborating over a network to share documents, programs or your desktop with other people. (Uses DFSR and P2P) |
42752 | This feature allows this computer to discover other devices and be discovered by other devices on the network. (Uses Function Discovery Host and Publication Services, UPnP, SSDP, NetBIOS and LLMNR) |
43002 | This feature allows users of this computer to request remote assistance from other users on the network. (Uses UPnP, SSDP, PNRP and Teredo) |
43252 | This feature allows remote management of the local task scheduling service. (Uses RPC) |
43502 | This feature coordinates transactions that update transaction-protected resources, such as databases, message queues and file systems. |
43752 | This feature is used to allow incoming VPN and RAS connections. |
44002 | This feature allows other computers to find and communicate with your computer using the Peer Name Resolution Protocol. (Uses SSDP and PNRP) |
44251 | This feature allows remote management of Windows by exposing a set of manageable components in a set of classes defined by the Common Information Model (CIM) of the distributed management task force. (Uses DCOM) |
44501 | This feature provides remote software and hardware disk volume management. (Uses RPC) |
44752 | This feature allows remote management of the Performance Logs and Alerts service. (Uses RPC) |
46001 | This feature enables streaming of music, video and pictures to DLNA Digital Media Renderer devices. |
46251 | This feature enables sharing of content between two PCs with proximity devices when tapped together. |
COM Classes/Interfaces
Name | Type | Description |
---|---|---|
INetFwAuthorizedApplication | Dispatch | |
INetFwAuthorizedApplications | Dispatch | |
INetFwIcmpSettings | Dispatch | |
INetFwMgr | Dispatch | |
INetFwOpenPort | Dispatch | |
INetFwOpenPorts | Dispatch | |
INetFwPolicy | Dispatch | |
INetFwPolicy2 | Dispatch | |
INetFwProduct | Dispatch | |
INetFwProducts | Dispatch | |
INetFwProfile | Dispatch | |
INetFwRemoteAdminSettings | Dispatch | |
INetFwRule | Dispatch | |
INetFwRule2 | Dispatch | |
INetFwRule3 | Dispatch | |
INetFwRules | Dispatch | |
INetFwService | Dispatch | |
INetFwServiceRestriction | Dispatch | |
INetFwServices | Dispatch |
Exported Functions List
The following functions are exported by this dll:DllCanUnloadNow | DllGetClassObject |
DllRegisterServer | DllUnregisterServer |
FWAddAuthenticationSet | FWAddConnectionSecurityRule |
FWAddCryptoSet | FWAddFirewallRule |
FWAddMainModeRule | FWAddSecurityRealm |
FWChangeNotificationCreate | FWChangeNotificationDestroy |
FWChangeTransactionalState | FWClosePolicyStore |
FWCopyAuthenticationSet | FWCopyConnectionSecurityRule |
FWCopyCryptoSet | FWCopyFirewallRule |
FWDeleteAllAuthenticationSets | FWDeleteAllConnectionSecurityRules |
FWDeleteAllCryptoSets | FWDeleteAllFirewallRules |
FWDeleteAllMainModeRules | FWDeleteAuthenticationSet |
FWDeleteConnectionSecurityRule | FWDeleteCryptoSet |
FWDeleteFirewallRule | FWDeleteMainModeRule |
FWDeletePhase1SAs | FWDeletePhase2SAs |
FWDeleteSecurityRealm | FWDiagGetAppList |
FWEnumAdapters | FWEnumAuthenticationSets |
FWEnumConnectionSecurityRules | FWEnumCryptoSets |
FWEnumFirewallRules | FWEnumMainModeRules |
FWEnumNetworks | FWEnumPhase1SAs |
FWEnumPhase2SAs | FWEnumProducts |
FWExportPolicy | FWFreeAdapters |
FWFreeAuthenticationSet | FWFreeAuthenticationSets |
FWFreeAuthenticationSetsByHandle | FWFreeConnectionSecurityRule |
FWFreeConnectionSecurityRules | FWFreeConnectionSecurityRulesByHandle |
FWFreeCryptoSet | FWFreeCryptoSets |
FWFreeCryptoSetsByHandle | FWFreeDiagAppList |
FWFreeFirewallRule | FWFreeFirewallRules |
FWFreeFirewallRulesByHandle | FWFreeFirewallRulesOld |
FWFreeMainModeRule | FWFreeMainModeRules |
FWFreeMainModeRulesByHandle | FWFreeNetworks |
FWFreePhase1SAs | FWFreePhase2SAs |
FWFreeProducts | FWGetConfig |
FWGetConfig2 | FWGetGlobalConfig |
FWGetGlobalConfig2 | FWGetGlobalConfig3 |
FWGetIndicatedPortInUse | FWImportPolicy |
FWIndicatePortInUse | FWIndicateProxyForUrl |
FWIndicateProxyResolverRefresh | FWIndicateTupleInUse |
FWIsTargetAProxy | FWOpenPolicyStore |
FWQueryAuthenticationSets | FWQueryConnectionSecurityRules |
FWQueryCryptoSets | FWQueryFirewallRules |
FWQueryIsolationType | FWQueryMainModeRules |
FWRegisterProduct | FWResetIndicatedPortInUse |
FWResetIndicatedTupleInUse | FWRestoreDefaults |
FWRestoreGPODefaults | FWRevertTransaction |
FWSelectConSecRule | FWSetAuthenticationSet |
FWSetConfig | FWSetConnectionSecurityRule |
FWSetCryptoSet | FWSetFirewallRule |
FWSetGlobalConfig | FWSetGlobalConfig2 |
FWSetMainModeRule | FWStatusMessageFromStatusCode |
FWUnregisterProduct | FWVerifyAuthenticationSet |
FWVerifyAuthenticationSetQuery | FWVerifyConnectionSecurityRule |
FWVerifyConnectionSecurityRuleQuery | FWVerifyCryptoSet |
FWVerifyCryptoSetQuery | FWVerifyFirewallRule |
FWVerifyFirewallRuleQuery | FWVerifyMainModeRule |
FWVerifyMainModeRuleQuery | FwActivate |
FwAlloc | FwAllocCheckSize |
FwAllowedProgramsAdd | FwAllowedProgramsDelete |
FwAnalyzeFirewallPolicy | FwAnalyzeFirewallPolicyOnProfile |
FwApiHelperFree | FwApiHelperInit |
FwBstrToPorts | FwConvertIPv6SubNetToRange |
FwCopyAuthSet | FwCopyMainModeRule |
FwCopyWFAddressesContents | FwEmptyWFAddresses |
FwFree | FwFreeAddresses |
FwFreePorts | FwGetAddressesAsString |
FwGetCurrentProfile | FwGetVersionField |
FwIcmpSettingsEnum | FwIcmpSettingsSet |
FwIsGroupPolicyEnforced | FwIsRemoteManagementEnabled |
FwLogSettingsSet | FwMergeAddresses |
FwMulticastBroadcastResponsesEnum | FwMulticastBroadcastResponsesSet |
FwNotificationsEnum | FwNotificationsSet |
FwOpModesEnum | FwOpModesSet |
FwPortOpeningsAdd | FwPortOpeningsDelete |
FwProfileTypeCurrentGet | FwProfileTypeGet |
FwRestoreDefaults | FwServicesEnum |
FwServicesSet | FwStringToAddresses |
FwStringToPorts | GetDisabledInterfaces |
IcfAddrChangeNotificationCreate | IcfChangeNotificationCreate |
IcfChangeNotificationDestroy | IcfConnect |
IcfDisconnect | IcfFreeDynamicFwPorts |
IcfFreeProfile | IcfFreeTickets |
IcfGetCurrentProfileType | IcfGetDynamicFwPorts |
IcfGetOperationalMode | IcfGetProfile |
IcfGetTickets | IcfIsPortAllowed |
IcfOpenDynamicFwPortWithoutSocket | IcfSubNetsGetScope |
IsFirewallInCoExistanceMode | IsPortOrICMPAllowed |
NetworkIsolationAddAllowEnterpriseIdRule | NetworkIsolationCreateAllInterfacesContainer |
NetworkIsolationCreateAppContainer | NetworkIsolationCreateInterfaceContainer |
NetworkIsolationDeleteAllInterfacesContainer | NetworkIsolationDeleteAllowEnterpriseIdRule |
NetworkIsolationDeleteAppContainer | NetworkIsolationDeleteInterfaceContainer |
NetworkIsolationDiagnoseConnectFailure | NetworkIsolationDiagnoseConnectFailureAndGetInfo |
NetworkIsolationDiagnoseListen | NetworkIsolationDiagnoseSocketCreation |
NetworkIsolationEnumAppContainers | NetworkIsolationEnumerateAppContainerRules |
NetworkIsolationFreeAppContainers | NetworkIsolationGetAppContainer |
NetworkIsolationGetAppContainerConfig | NetworkIsolationGetEnterpriseId |
NetworkIsolationGetEnterpriseIdAsync | NetworkIsolationGetEnterpriseIdClose |
NetworkIsolationRegisterForAppContainerChanges | NetworkIsolationSetAppContainerConfig |
NetworkIsolationSetupAppContainerBinaries | NetworkIsolationUnregisterForAppContainerChanges |
Imported Functions List
The following functions are imported by this dll:- msvcrt.dll:
_CxxThrowException _XcptFilter __CxxFrameHandler _amsg_exit _callnewh _except_handler4_common _initterm _purecall _vsnwprintf _wcsicmp _wcsnicmp free malloc memcmp memcpy memset public: virtual __thiscall type_info::~type_info(void) qsort realloc void __cdecl terminate(void) wcscat_s wcscpy_s wcstok - ntdll.dll:
EtwEventRegister EtwEventUnregister EtwEventWrite EtwGetTraceEnableFlags EtwGetTraceEnableLevel EtwGetTraceLoggerHandle EtwRegisterTraceGuidsW EtwTraceMessage EtwUnregisterTraceGuids RtlIpv4StringToAddressW RtlIpv6StringToAddressW - RPCRT4.dll:
CStdStubBuffer_AddRef CStdStubBuffer_DebugServerQueryInterface CStdStubBuffer_DebugServerRelease CStdStubBuffer_Invoke CStdStubBuffer_IsIIDSupported IUnknown_AddRef_Proxy IUnknown_QueryInterface_Proxy IUnknown_Release_Proxy NdrAsyncClientCall2 NdrCStdStubBuffer2_Release NdrClientCall4 NdrDllCanUnloadNow NdrDllGetClassObject NdrDllRegisterProxy NdrDllUnregisterProxy NdrOleAllocate NdrOleFree NdrStubCall2 NdrStubForwardingFunction RpcAsyncCancelCall RpcAsyncCompleteCall RpcAsyncInitializeHandle RpcBindingFree RpcBindingFromStringBindingW RpcBindingSetAuthInfoExW RpcBindingSetOption RpcEpResolveBinding RpcStringBindingComposeW RpcStringFreeW UuidCreate UuidToStringW - api-ms-win-core-com-midlproxystub-l1-1-0.dll:
combase!CStdStubBuffer2_Connect combase!CStdStubBuffer2_CountRefs combase!CStdStubBuffer2_Disconnect combase!CStdStubBuffer2_QueryInterface combase!NdrProxyForwardingFunction3 combase!NdrProxyForwardingFunction4 combase!NdrProxyForwardingFunction5 combase!NdrProxyForwardingFunction6 combase!ObjectStublessClient10 combase!ObjectStublessClient11 combase!ObjectStublessClient12 combase!ObjectStublessClient13 combase!ObjectStublessClient14 combase!ObjectStublessClient15 combase!ObjectStublessClient16 combase!ObjectStublessClient17 combase!ObjectStublessClient18 combase!ObjectStublessClient19 combase!ObjectStublessClient20 combase!ObjectStublessClient21 combase!ObjectStublessClient22 combase!ObjectStublessClient23 combase!ObjectStublessClient24 combase!ObjectStublessClient25 combase!ObjectStublessClient26 combase!ObjectStublessClient7 combase!ObjectStublessClient8 combase!ObjectStublessClient9 - api-ms-win-core-synch-l1-2-0.dll:
KernelBase!CreateEventW KernelBase!SetEvent KernelBase!Sleep KernelBase!WaitForSingleObject ntdll!RtlDeleteCriticalSection ntdll!RtlEnterCriticalSection ntdll!RtlInitializeCriticalSection ntdll!RtlLeaveCriticalSection - api-ms-win-core-libraryloader-l1-2-0.dll:
KernelBase!DisableThreadLibraryCalls KernelBase!FindResourceExW KernelBase!FreeLibrary KernelBase!GetModuleFileNameW KernelBase!GetModuleHandleW KernelBase!GetProcAddress KernelBase!LoadLibraryExW KernelBase!LoadResource KernelBase!SizeofResource - api-ms-win-core-string-l2-1-0.dll:
KernelBase!CharNextW KernelBase!CharPrevW - api-ms-win-core-errorhandling-l1-1-1.dll:
KernelBase!GetLastError KernelBase!SetUnhandledExceptionFilter KernelBase!UnhandledExceptionFilter - api-ms-win-core-registry-l1-1-0.dll:
KernelBase!RegCloseKey KernelBase!RegCreateKeyExW KernelBase!RegDeleteTreeW KernelBase!RegDeleteValueW KernelBase!RegEnumKeyExW KernelBase!RegEnumValueW KernelBase!RegOpenCurrentUser KernelBase!RegOpenKeyExW KernelBase!RegQueryInfoKeyW KernelBase!RegRestoreKeyW KernelBase!RegSaveKeyExW KernelBase!RegSetValueExW - api-ms-win-core-sysinfo-l1-2-1.dll:
KernelBase!GetSystemInfo KernelBase!GetSystemTimeAsFileTime KernelBase!GetTickCount KernelBase!GetVersionExW - api-ms-win-core-memory-l1-1-2.dll:
KernelBase!VirtualAlloc KernelBase!VirtualProtect KernelBase!VirtualQuery - api-ms-win-core-string-l1-1-0.dll:
KernelBase!CompareStringOrdinal KernelBase!CompareStringW KernelBase!MultiByteToWideChar - api-ms-win-core-heap-l1-2-0.dll:
KernelBase!HeapDestroy - api-ms-win-security-base-l1-2-0.dll:
KernelBase!AccessCheck KernelBase!CheckTokenCapability KernelBase!CheckTokenMembership KernelBase!CreateWellKnownSid KernelBase!DuplicateTokenEx KernelBase!RevertToSelf - api-ms-win-core-version-l1-1-0.dll:
KernelBase!GetFileVersionInfoExW KernelBase!GetFileVersionInfoSizeExW KernelBase!VerQueryValueW - api-ms-win-core-heap-l2-1-0.dll:
KernelBase!LocalAlloc KernelBase!LocalFree - api-ms-win-core-localization-l1-2-1.dll:
KernelBase!FormatMessageW KernelBase!GetSystemDefaultLangID KernelBase!GetThreadUILanguage - api-ms-win-core-processthreads-l1-1-2.dll:
KernelBase!OpenProcessToken KernelBase!OpenThreadToken KernelBase!SetThreadToken kernel32!GetCurrentProcess kernel32!GetCurrentProcessId kernel32!GetCurrentThread kernel32!GetCurrentThreadId kernel32!TerminateProcess - api-ms-win-core-threadpool-l1-2-0.dll:
KernelBase!CreateThreadpoolWait ntdll!TpReleaseWait ntdll!TpSetWait ntdll!TpWaitForWait - api-ms-win-core-debug-l1-1-1.dll:
KernelBase!IsDebuggerPresent - api-ms-win-core-profile-l1-1-0.dll:
ntdll!RtlQueryPerformanceCounter - api-ms-win-core-string-obsolete-l1-1-0.dll:
kernel32!lstrcmpiW kernel32!lstrcpynW - api-ms-win-core-delayload-l1-1-1.dll:
KernelBase!DelayLoadFailureHook KernelBase!ResolveDelayLoadedAPI