From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Review firewall logs

Review firewall logs

From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Start my 1-month free trial

Review firewall logs

- [Instructor] The Windows Firewall maintains a log of all allowed and blocked connections but this can become quite a large text file which is somewhat difficult to use. The ZedLan analyzer for Windows Firewall logs provides a more manageable interface for log viewing and analysis. It's available as a free download from the MoonPoint site shown here. I've already installed this on my computer so I'll get straight into it. I'm running it as Administrator as I need to access system space to get the logs. ZedLan needs to be configured before we can use it. Let's do that now by clicking the link in the middle of the screen. We need to specify where our log files are and ZedLan pops up a window to ask us to enter the location or to let ZedLan automatically detect it. I'll close this alert and look for the log files manually. I'll press the Browse button and navigate to Windows system 32 log files firewall and I'll select the pfirewall file. If the Lookup Hostnames checkbox is set, ZedLan…

Contents