MS-FASP / Port Scanning Prevention Filter / Stealth Mode - Security Event Log Filling/Archiving at a Rapid Pace
microsoft firewall , advanced security platform:
we have windows 2012 server has firewall enabled , group policy enforces failures "auditobjectaccess" security event log event ids 5152, 5157. these logs set archive have retain them security requirements. these logs filling our current disk capacity @ high rate. is there way reduce logged events, without modifying gpo, without disabling firewall service, , without running scheduled task update policy disable block packets:
- auditpol /set /subcategory:"filtering platform policy change" /success:disable /failure:disable)
right i’m going down hole figure out rule "blocking" traffic , looks default/hidden windows fw rule “port scanning prevention filter.” followed troubleshooting steps , found filter run-time id:108788 filter blocking ports in question. looking @ wfpdiag.xml names filter “port scanning prevention filter”. have explicit rules applied allowing uniflow traffic, still being “blocked”.
there isn’t existing port located on server in question, in listening state. therefore believe networking stack dropping packet before being processed, still shows in security log. consistent how windows firewall implements stealth mode.
stealth mode: firewall said operating in stealth mode when prevents host computer responding unsolicited network traffic.
links:
- similar issues:
- https://social.msdn.microsoft.com/forums/windowsdesktop/en-us/5ac9da66-f307-4b3f-ba03-87952d451f85/the-windows-filtering-platform-blocked-a-packet-on-port-389?forum=wfp
- https://social.technet.microsoft.com/forums/windowsserver/en-us/b627fbdf-e51b-4671-911e-3308271e3a0e/windows-adv-firewall-drops-allowed-traffic-to-closed-ports
- ms-fasp details
- stealth mode
- fixes listed in links pertaining w2k8 (we using w2k12), to disable stealth mode @ registry haven't worked in eliminating logged events.
- https://technet.microsoft.com/en-us/library/dd448557(v=ws.10).aspx
hi abesun,
then, have checked packets which are blocked firewall. are packets supposed blocked might send malicious devices?
we may use network monitor analyze packets, find out send packets computer.
network monitor download:
https://www.microsoft.com/en-us/download/details.aspx?id=4865
best regards,
anne
please remember mark replies answers if , unmark them if provide no help. if have feedback technet support, contact tnmff@microsoft.com.
Windows Server > Platform Networking
Comments
Post a Comment