Event Details
User Activity->Network and Firewall Tracking->Windows Firewall->Windows 2008->EventID 4944 - The following policy was active when the Windows Firewall started.
EventID 4944 - The following policy was active when the Windows Firewall started.
 Sample:
Log Name:      Security
Source:        Microsoft-Windows-Security-Auditing
Date:          10/27/2009 9:53:52 PM
Event ID:      4944
Task Category: MPSSVC Rule-Level Policy Change
Level:         Information
Keywords:      Audit Success
User:          N/A
Computer:      dcc1.Logistics.corp
Description:   
The following policy was active when the Windows Firewall started.
Group Policy Applied:	No
Profile Used:	Public
Operational mode:	On
Allow Remote Administration:	Disabled
Allow Unicast Responses to Multicast/Broadcast Traffic:	Enabled
Security Logging:
	Log Dropped Packets:	Disabled
	Log Successful Connections:	Disabled
Log Type: Windows Event Log
 Uniquely Identified By:
Log Name: Security
Filtering Field Equals to Value
OSVersion Windows Vista (2008)
Windows 7 (2008 R2)
Windows 8 (2012)
Windows 8.1 (2012 R2)
Windows 10 (2016)
Category Policy Change
Source Microsoft-Windows-Security-Auditing
TaskCategory MPSSVC Rule-Level Policy Change
EventId 4944
Field Matching
FieldDescriptionStored inSample Value
When At what date and time a user activity originated in the system. DateTime
Who Account or user name under which the activity occured. User
What The type of activity occurred (e.g. Logon, Password Changed, etc.) TaskCategory
Where The name of the workstation/server where the activity was logged. Computer
Where From The name of the workstation/server where the activity was initiated from. - 10.10.10.10
Severity Specify the seriousness of the event. "Low" Low
WhoDomain -
WhereDomain -
Comments
You must be logged in to comment