Skip to content

Firewall Rules

Evidence: Firewall Rules
Description: Enumerate Firewall Rules
Category: Network
Platform: windows
Short Name: frwl
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

Windows Firewall (Windows Defender Firewall) controls network traffic to and from the system based on configurable rules. Attackers often modify firewall rules to allow malicious traffic, open backdoors, or disable security controls.

Firewall rules can be configured per-profile (Domain, Private, Public) and can allow or block traffic based on application, port, protocol, and IP address.

This collector gathers structured data about firewall rules.

FieldDescriptionExample
NameRule nameBlock Outbound Telnet
DescriptionRule descriptionBlocks outbound telnet traffic
ApplicationNameApplication pathC:\Windows\System32\telnet.exe
ServiceNameService nameRemoteAccess
ProtocolIP protocolTCP
LocalPortLocal port(s)80,443
RemotePortRemote port(s)Any
ICMPTypeICMP type and code8:*
LocalLocal addressesAny
RemoteRemote addressesAny
DirectionTraffic directionIn/Out
ActionRule actionAllow/Block
RuleEnabledWhether rule is activeTRUE
FirewallProfileProfile(s) where rule appliesDomain Private Public
InterfaceNetwork interfaces
InterfaceTypeInterface type filterAll
GroupingRule groupRemote Desktop
EdgeTraversalEdge traversal settingFALSE

This collector uses the Windows Firewall COM API to:

  • Create INetFwPolicy2 instance
  • Retrieve all firewall rules via get_Rules
  • Enumerate each rule and extract configuration details
  • Parse application paths and file information

Firewall rules provide critical evidence for detecting unauthorized network access, backdoors, and security control tampering. Investigators use this data to identify suspicious allow rules for malware, detect disabled security controls, track unauthorized remote access rules, identify data exfiltration paths, detect lateral movement enablers, and correlate firewall changes with security incidents.