That is a start. Strange that the example show to use “name=any” but it is actually “name=all”.
I just found this, http://blogs.technet.com/b/jamesone/archive/2009/02/18/how-to-manage-the-windows-firewall-settings-with-powershell.aspx , and will see what it can do for me. Thanks Carl Webster Consultant and Citrix Technology Professional http://www.CarlWebster.com<http://www.carlwebster.com/> From: Mike Wiebke [mailto:[email protected]] Subject: Re: list Windows Firewall rules netsh advfirewall monitor show firewall rule name=all dir=in This should give you all of the inbound rules. But with the format it's in, I'm not sure of an easy way to filter it to only those that are enabled. May have to resort to some powershell to accomplish that. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
