Skip to main content

EPM - Windows Configuration - Agent Procedure - Windows Firewall Enable

Summary

This agent procedure is used to enable Windows Firewall on an endpoint.

Example Agent Procedure Log

TimestampActionStatusUser
8:55:45 am 2-Nov-22Windows Firewall EnableSuccess THENprovaltech.com/surender.kumar
8:55:45 am 2-Nov-22Windows Firewall Enable -0003Windows Firewall Successfully Enabled.provaltech.com/surender.kumar
8:55:45 am 2-Nov-22Windows Firewall EnableComparing files C:/PROVALTECH/pvtfw.txt and C:/PROVALTECH/PBLFW.TXT FC: no differences encounteredprovaltech.com/surender.kumar
8:55:45 am 2-Nov-22Execute Shell command - Get Results to VariableSuccess THENprovaltech.com/surender.kumar
8:55:43 am 2-Nov-22Execute Shell command - Get Results to Variable-0005Executing command in 64-bit shell as system: fc C:/provaltech/pvtfw.txt C:/provaltech/pblfw.txt >"c:/provaltech/commandresults-1804840338.txt" 2>&1provaltech.com/surender.kumar
8:55:42 am 2-Nov-22Execute Powershell CommandSuccess THENprovaltech.com/surender.kumar
8:55:42 am 2-Nov-22Execute Powershell Command-0012Results returned to global variable #global:psresult# and saved in Documents tab of server.provaltech.com/surender.kumar
8:55:42 am 2-Nov-22Execute Powershell Command-0012Informational: GetFile command overwrote the server file C:/Kaseya/UserProfiles/382358830087781/GetFiles/../docs/psoutput.txt with the new contents from c:/provaltech/psoutput.txt in THEN step 2.provaltech.com/surender.kumar
8:55:41 am 2-Nov-22Execute Powershell Command-0011Powershell command completed!provaltech.com/surender.kumar
8:55:35 am 2-Nov-22Execute Powershell Command-0011Executing powershell "" -Command "Get-NetFirewallProfile -Name PublicSelect-Object -ExpandProperty Enabled >C:/provaltech/pblfw.txt" >"c:/provaltech/psoutput.txt"
8:55:35 am 2-Nov-22Execute Powershell Command-0010Sending output to global variable.provaltech.com/surender.kumar
8:55:35 am 2-Nov-22Execute Powershell Command-0008New command variable is: -Command "Get-NetFirewallProfile -Name PublicSelect-Object -ExpandProperty Enabled >C:/provaltech/pblfw.txt"
8:55:35 am 2-Nov-22Execute Powershell Command-0008Custom commands detected as Get-NetFirewallProfile -Name PublicSelect-Object -ExpandProperty Enabled >C:/provaltech/pblfw.txt
8:55:32 am 2-Nov-22Execute Powershell Command-0002Powershell is present.provaltech.com/surender.kumar
8:55:30 am 2-Nov-22Execute Powershell CommandSuccess THENprovaltech.com/surender.kumar
8:55:30 am 2-Nov-22Execute Powershell Command-0012Results returned to global variable #global:psresult# and saved in Documents tab of server.provaltech.com/surender.kumar
8:55:30 am 2-Nov-22Execute Powershell Command-0012Informational: GetFile command overwrote the server file C:/Kaseya/UserProfiles/382358830087781/GetFiles/../docs/psoutput.txt with the new contents from c:/provaltech/psoutput.txt in THEN step 2.provaltech.com/surender.kumar
8:55:30 am 2-Nov-22Execute Powershell Command-0011Powershell command completed!provaltech.com/surender.kumar
8:55:23 am 2-Nov-22Execute Powershell Command-0011Executing powershell "" -Command "Get-NetFirewallProfile -Name PrivateSelect-Object -ExpandProperty Enabled >C:/provaltech/pvtfw.txt" >"c:/provaltech/psoutput.txt"
8:55:23 am 2-Nov-22Execute Powershell Command-0010Sending output to global variable.provaltech.com/surender.kumar
8:55:23 am 2-Nov-22Execute Powershell Command-0008New command variable is: -Command "Get-NetFirewallProfile -Name PrivateSelect-Object -ExpandProperty Enabled >C:/provaltech/pvtfw.txt"
8:55:23 am 2-Nov-22Execute Powershell Command-0008Custom commands detected as Get-NetFirewallProfile -Name PrivateSelect-Object -ExpandProperty Enabled >C:/provaltech/pvtfw.txt
8:55:19 am 2-Nov-22Execute Powershell Command-0002Powershell is present.provaltech.com/surender.kumar
8:55:18 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)Success THENprovaltech.com/surender.kumar
8:55:17 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0014Powershell command completed!provaltech.com/surender.kumar
8:55:14 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0011Executing 64-bit Powershell command as System: "" -command "Set-NetFirewallProfile -Profile Public -Enabled True" ""provaltech.com/surender.kumar
8:55:14 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0013Not sending output to variable.provaltech.com/surender.kumar
8:55:14 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0008Custom commands detected as Set-NetFirewallProfile -Profile Public -Enabled Trueprovaltech.com/surender.kumar
8:55:14 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0003No powershell file variable detected.provaltech.com/surender.kumar
8:55:12 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0002Powershell is present.provaltech.com/surender.kumar
8:55:11 am 2-Nov-22Windows Firewall Enable -0002Public Firewall is OFFprovaltech.com/surender.kumar
8:55:11 am 2-Nov-22Execute Powershell CommandSuccess THENprovaltech.com/surender.kumar
8:55:11 am 2-Nov-22Execute Powershell Command-0012Results returned to global variable #global:psresult# and saved in Documents tab of server.provaltech.com/surender.kumar
8:55:11 am 2-Nov-22Execute Powershell Command-0012Informational: GetFile command overwrote the server file C:/Kaseya/UserProfiles/382358830087781/GetFiles/../docs/psoutput.txt with the new contents from c:/provaltech/psoutput.txt in THEN step 2.provaltech.com/surender.kumar
8:55:10 am 2-Nov-22Execute Powershell Command-0011Powershell command completed!provaltech.com/surender.kumar
8:55:04 am 2-Nov-22Execute Powershell Command-0011Executing powershell "" -Command "Get-NetFirewallProfile -Name PublicSelect-Object -ExpandProperty Enabled >C:/provaltech/pblfw.txt" >"c:/provaltech/psoutput.txt"
8:55:04 am 2-Nov-22Execute Powershell Command-0010Sending output to global variable.provaltech.com/surender.kumar
8:55:03 am 2-Nov-22Execute Powershell Command-0008New command variable is: -Command "Get-NetFirewallProfile -Name PublicSelect-Object -ExpandProperty Enabled >C:/provaltech/pblfw.txt"
8:55:03 am 2-Nov-22Execute Powershell Command-0008Custom commands detected as Get-NetFirewallProfile -Name PublicSelect-Object -ExpandProperty Enabled >C:/provaltech/pblfw.txt
8:55:00 am 2-Nov-22Execute Powershell Command-0002Powershell is present.provaltech.com/surender.kumar
8:54:59 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)Success THENprovaltech.com/surender.kumar
8:54:59 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0014Powershell command completed!provaltech.com/surender.kumar
8:54:55 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0011Executing 64-bit Powershell command as System: "" -command "Set-NetFirewallProfile -Profile Private -Enabled True" ""provaltech.com/surender.kumar
8:54:55 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0013Not sending output to variable.provaltech.com/surender.kumar
8:54:55 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0008Custom commands detected as Set-NetFirewallProfile -Profile Private -Enabled Trueprovaltech.com/surender.kumar
8:54:55 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0003No powershell file variable detected.provaltech.com/surender.kumar
8:54:53 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0002Powershell is present.provaltech.com/surender.kumar
8:54:52 am 2-Nov-22Windows Firewall Enable -0001Private Firewall is OFFprovaltech.com/surender.kumar
8:54:52 am 2-Nov-22Execute Powershell CommandSuccess THENprovaltech.com/surender.kumar
8:54:52 am 2-Nov-22Execute Powershell Command-0012Results returned to global variable #global:psresult# and saved in Documents tab of server.provaltech.com/surender.kumar
8:54:52 am 2-Nov-22Execute Powershell Command-0012Informational: GetFile command overwrote the server file C:/Kaseya/UserProfiles/382358830087781/GetFiles/../docs/psoutput.txt with the new contents from c:/provaltech/psoutput.txt in THEN step 2.provaltech.com/surender.kumar
8:54:51 am 2-Nov-22Execute Powershell Command-0011Powershell command completed!provaltech.com/surender.kumar
8:54:44 am 2-Nov-22Execute Powershell Command-0011Executing powershell "" -Command "Get-NetFirewallProfile -Name PrivateSelect-Object -ExpandProperty Enabled >C:/provaltech/pvtfw.txt" >"c:/provaltech/psoutput.txt"
8:54:44 am 2-Nov-22Execute Powershell Command-0010Sending output to global variable.provaltech.com/surender.kumar
8:54:44 am 2-Nov-22Execute Powershell Command-0008New command variable is: -Command "Get-NetFirewallProfile -Name PrivateSelect-Object -ExpandProperty Enabled >C:/provaltech/pvtfw.txt"
8:54:44 am 2-Nov-22Execute Powershell Command-0008Custom commands detected as Get-NetFirewallProfile -Name PrivateSelect-Object -ExpandProperty Enabled >C:/provaltech/pvtfw.txt
8:54:41 am 2-Nov-22Execute Powershell Command-0002Powershell is present.provaltech.com/surender.kumar
8:54:32 am 2-Nov-22Run Now - Windows Firewall EnableAdmin provaltech.com/surender.kumar scheduled procedure Run Now - Windows Firewall Enable to run at Nov 2 2022 8:54 AMprovaltech.com/surender.kumar

Dependencies

None

Process

The agent procedure checks whether the machine has the firewall enabled. If not, the procedure enables it and saves its logs in the procedure log entry.

Output

Procedure Logs

Attachments

Procedure_Windows_Firewall_Enable_.xml