From 9a1eeefca99449cc35e725f2f6f6f0520c56715c Mon Sep 17 00:00:00 2001 From: Thumbscrew Date: Thu, 30 Jan 2020 14:21:01 +0000 Subject: [PATCH] Updated psd1 with min PS Version. Added example to README. --- PSWinFW.psd1 | Bin 8186 -> 8244 bytes README.md | 4 ++++ 2 files changed, 4 insertions(+) diff --git a/PSWinFW.psd1 b/PSWinFW.psd1 index 408cda4b6214fae458717e10f561253cbe290ac1..c2aa41a626df8f453de80c6d8091ee538ac003bf 100644 GIT binary patch delta 129 zcmexmzr|t0JjTh37<(8^H|sM^WM*`n+{h;Bp39KWkit;Pki(G5pums@ zNM-`*G9a19kPZ}01kx!$It3_F%uoQ-lgLmBk)2$~COr8Us{~{5WI?u*lan|^CVyfR QV>M>bV=&mv&i+{f0DJr(UH||9 delta 91 zcmdnu@XLO~JVs_chM3878G9K`Hfu9YWLEcO$Y)4lC}qfDNM%r9C;{>m7>a=G5+Iog oq|3nKiIZj7v?qJ9otP}Z!#4Q>yU=7ccCpFlIQTXPus@Li0ANoT7ytkO diff --git a/README.md b/README.md index 34120cd..2cf5c98 100644 --- a/README.md +++ b/README.md @@ -27,6 +27,10 @@ Get Windows Firewall log on a remote computer using the Remote Registry service ```powershell Get-PSFirewallLog -LogProfile Public -ComputerName MyRemoteComputer -Verbose ``` +Get the last 100 events from the Domain profile of a remote machine, inferring the path using the local machine's path (doesn't use Remote Registry service): +```powershell +Get-PSFirewallLog -LogProfile Domain -ComputerName MyRemoteComputer -InferPath -Tail 100 +``` Get the last 100 events from the Private profile firewall log and follow the log: ```powershell Get-PSFirewallLog -LogProfile Private -Tail 100 -Wait