From 1a07e1750ebfdc97dc848149f94be56ac9e47171 Mon Sep 17 00:00:00 2001 From: Thumbscrew Date: Fri, 29 Nov 2019 11:46:44 +0000 Subject: [PATCH 1/3] Updated psd to version 0.3. Updated README. --- PSWinFW.psd1 | Bin 8186 -> 8186 bytes README.md | 4 ++++ 2 files changed, 4 insertions(+) diff --git a/PSWinFW.psd1 b/PSWinFW.psd1 index df06a5840fb73bb98310a6123ce1e45f45a96937..54ac9ddd0a8b59f6b9c22324ddcab321ac69e9fe 100644 GIT binary patch delta 14 Vcmexm|I2=Z9uuSSW__m9vH&j?1ycY3 delta 14 Vcmexm|I2=Z9uuR{W__m9vH&j+1yTS2 diff --git a/README.md b/README.md index 37b1fa2..34120cd 100644 --- a/README.md +++ b/README.md @@ -26,4 +26,8 @@ Get-PSFirewallLog -LogProfile Domain Get Windows Firewall log on a remote computer using the Remote Registry service to get the log path: ```powershell Get-PSFirewallLog -LogProfile Public -ComputerName MyRemoteComputer -Verbose +``` +Get the last 100 events from the Private profile firewall log and follow the log: +```powershell +Get-PSFirewallLog -LogProfile Private -Tail 100 -Wait ``` \ No newline at end of file From 125047ceddca3a9d2435b0a60d105a772a6e0462 Mon Sep 17 00:00:00 2001 From: Thumbscrew Date: Mon, 6 Jan 2020 15:54:47 +0000 Subject: [PATCH 2/3] Updated version to 0.4 --- PSWinFW.psd1 | Bin 8186 -> 8186 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/PSWinFW.psd1 b/PSWinFW.psd1 index 54ac9ddd0a8b59f6b9c22324ddcab321ac69e9fe..408cda4b6214fae458717e10f561253cbe290ac1 100644 GIT binary patch delta 14 Vcmexm|I2=Z9uuR Date: Thu, 30 Jan 2020 14:21:01 +0000 Subject: [PATCH 3/3] Updated psd1 with min PS Version. Added example to README. --- PSWinFW.psd1 | Bin 8186 -> 8244 bytes README.md | 4 ++++ 2 files changed, 4 insertions(+) diff --git a/PSWinFW.psd1 b/PSWinFW.psd1 index 408cda4b6214fae458717e10f561253cbe290ac1..c2aa41a626df8f453de80c6d8091ee538ac003bf 100644 GIT binary patch delta 129 zcmexmzr|t0JjTh37<(8^H|sM^WM*`n+{h;Bp39KWkit;Pki(G5pums@ zNM-`*G9a19kPZ}01kx!$It3_F%uoQ-lgLmBk)2$~COr8Us{~{5WI?u*lan|^CVyfR QV>M>bV=&mv&i+{f0DJr(UH||9 delta 91 zcmdnu@XLO~JVs_chM3878G9K`Hfu9YWLEcO$Y)4lC}qfDNM%r9C;{>m7>a=G5+Iog oq|3nKiIZj7v?qJ9otP}Z!#4Q>yU=7ccCpFlIQTXPus@Li0ANoT7ytkO diff --git a/README.md b/README.md index 34120cd..2cf5c98 100644 --- a/README.md +++ b/README.md @@ -27,6 +27,10 @@ Get Windows Firewall log on a remote computer using the Remote Registry service ```powershell Get-PSFirewallLog -LogProfile Public -ComputerName MyRemoteComputer -Verbose ``` +Get the last 100 events from the Domain profile of a remote machine, inferring the path using the local machine's path (doesn't use Remote Registry service): +```powershell +Get-PSFirewallLog -LogProfile Domain -ComputerName MyRemoteComputer -InferPath -Tail 100 +``` Get the last 100 events from the Private profile firewall log and follow the log: ```powershell Get-PSFirewallLog -LogProfile Private -Tail 100 -Wait