Skip to main content

Windows Firewall Enable

Summary

This document provides the option to enable Windows Firewall for both Public and Private Networks.

Example Agent Procedure Log

TimeActionStatusUser
10:14:17 am 2-Nov-22Windows Firewall EnableSuccess THENprovaltech.com/dan.hicks
10:14:17 am 2-Nov-22Windows Firewall Enable -0004Public Firewall is ONprovaltech.com/dan.hicks
10:14:17 am 2-Nov-22Execute Powershell CommandSuccess THENprovaltech.com/dan.hicks
10:14:17 am 2-Nov-22Execute Powershell Command-0012Results returned to global variable #global:psresult# and saved in Documents tab of server.provaltech.com/dan.hicks
10:14:17 am 2-Nov-22Execute Powershell Command-0012Informational: GetFile command overwrote the server file C:/Kaseya/UserProfiles/735959849026022/GetFiles/../docs/psoutput.txt with the new contents from c:/provaltech/psoutput.txt in THEN step 2.provaltech.com/dan.hicks
10:14:16 am 2-Nov-22Execute Powershell Command-0011Powershell command completed!provaltech.com/dan.hicks
10:14:13 am 2-Nov-22Execute Powershell Command-0011Executing powershell "" -Command "Get-NetFirewallProfile -Name PublicSelect-Object -ExpandProperty Enabled" >"c:/provaltech/psoutput.txt"
10:14:13 am 2-Nov-22Execute Powershell Command-0010Sending output to global variable.provaltech.com/dan.hicks
10:14:12 am 2-Nov-22Execute Powershell Command-0008New command variable is: -Command "Get-NetFirewallProfile -Name PublicSelect-Object -ExpandProperty Enabled"
10:14:12 am 2-Nov-22Execute Powershell Command-0008Custom commands detected as Get-NetFirewallProfile -Name PublicSelect-Object -ExpandProperty Enabled
10:14:11 am 2-Nov-22Execute Powershell Command-0002Powershell is present.provaltech.com/dan.hicks
10:14:10 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)Success THENprovaltech.com/dan.hicks
10:14:10 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0014Powershell command completed!provaltech.com/dan.hicks
10:14:06 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0011Executing 64-bit Powershell command as System: "" -command "Set-NetFirewallProfile -Profile Public -Enabled True" ""provaltech.com/dan.hicks
10:14:06 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0013Not sending output to variable.provaltech.com/dan.hicks
10:14:06 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0008Custom commands detected as Set-NetFirewallProfile -Profile Public -Enabled Trueprovaltech.com/dan.hicks
10:14:06 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0003No powershell file variable detected.provaltech.com/dan.hicks
10:14:04 am 2-Nov-22Execute Powershell Command (64-bit, Run As System)-0002Powershell is present.provaltech.com/dan.hicks
10:14:03 am 2-Nov-22Windows Firewall Enable -0003Public Firewall is OFF, Enabling.provaltech.com/dan.hicks
10:14:03 am 2-Nov-22Execute Powershell CommandSuccess THENprovaltech.com/dan.hicks
10:14:03 am 2-Nov-22Execute Powershell Command-0012Results returned to global variable #global:psresult# and saved in Documents tab of server.provaltech.com/dan.hicks
10:14:03 am 2-Nov-22Execute Powershell Command-0012Informational: GetFile command overwrote the server file C:/Kaseya/UserProfiles/735959849026022/GetFiles/../docs/psoutput.txt with the new contents from c:/provaltech/psoutput.txt in THEN step 2.provaltech.com/dan.hicks
10:14:02 am 2-Nov-22Execute Powershell Command-0011Powershell command completed!provaltech.com/dan.hicks
10:13:58 am 2-Nov-22Execute Powershell Command-0011Executing powershell "" -Command "Get-NetFirewallProfile -Name PublicSelect-Object -ExpandProperty Enabled >C:/provaltech/pblfw.txt" >"c:/provaltech/psoutput.txt"
10:13:58 am 2-Nov-22Execute Powershell Command-0010Sending output to global variable.provaltech.com/dan.hicks
10:13:58 am 2-Nov-22Execute Powershell Command-0008New command variable is: -Command "Get-NetFirewallProfile -Name PublicSelect-Object -ExpandProperty Enabled >C:/provaltech/pblfw.txt"
10:13:58 am 2-Nov-22Execute Powershell Command-0008Custom commands detected as Get-NetFirewallProfile -Name PublicSelect-Object -ExpandProperty Enabled >C:/provaltech/pblfw.txt
10:13:56 am 2-Nov-22Execute Powershell Command-0002Powershell is present.provaltech.com/dan.hicks
10:13:55 am 2-Nov-22Windows Firewall Enable -0001Private Firewall is ONprovaltech.com/dan.hicks
10:13:55 am 2-Nov-22Execute Powershell CommandSuccess THENprovaltech.com/dan.hicks
10:13:55 am 2-Nov-22Execute Powershell Command-0012Results returned to global variable #global:psresult# and saved in Documents tab of server.provaltech.com/dan.hicks
10:13:55 am 2-Nov-22Execute Powershell Command-0012Informational: GetFile command overwrote the server file C:/Kaseya/UserProfiles/735959849026022/GetFiles/../docs/psoutput.txt with the new contents from c:/provaltech/psoutput.txt in THEN step 2.provaltech.com/dan.hicks
10:13:54 am 2-Nov-22Execute Powershell Command-0011Powershell command completed!provaltech.com/dan.hicks
10:13:50 am 2-Nov-22Execute Powershell Command-0011Executing powershell "" -Command "Get-NetFirewallProfile -Name PrivateSelect-Object -ExpandProperty Enabled" >"c:/provaltech/psoutput.txt"
10:13:50 am 2-Nov-22Execute Powershell Command-0010Sending output to global variable.provaltech.com/dan.hicks
10:13:50 am 2-Nov-22Execute Powershell Command-0008New command variable is: -Command "Get-NetFirewallProfile -Name PrivateSelect-Object -ExpandProperty Enabled"
10:13:50 am 2-Nov-22Execute Powershell Command-0008Custom commands detected as Get-NetFirewallProfile -Name PrivateSelect-Object -ExpandProperty Enabled
10:13:49 am 2-Nov-22Execute Powershell Command-0002Powershell is present.provaltech.com/dan.hicks
10:13:41 am 2-Nov-22Run Now - Windows Firewall EnableAdmin provaltech.com/dan.hicks scheduled procedure Run Now - Windows Firewall Enable

Process

If EnablePublicFirewall is set to 1, Windows Firewall will be enabled for Public Networks. The same applies for Private Networks.

Output

AP Log