1657 Firewall log files (*.log)*.log 1658 Browse 1659 log 1675 The value entered for the log file size is not valid. Enter a value between 1 and 32767 k. 23000 File and Printer Sharing 23001 NetBIOS Name Service 23002 NetBIOS Datagram Service 23004 NetBIOS Session Service 23005 SMB over TCP 23006 UPnP Framework 23007 SSDP Component of UPnP Framework 23008 UPnP Framework over TCP 23009 Remote Desktop 23012 Domain Name Server (DNS) 23013 Dynamic Host Configuration Protocol Server (DHCP) 23014 Dynamic Host Configuration Protocol Client (DHCP) 23015 Incoming Connection VPN (PPTP) 23016 Incoming Connection VPN (L2TP) 23017 IP Security (IPsec - IKE) 23018 IP Security (IPsec - IKE/NAT-T) 23038 Phase 1: Local address = %s, Remote address = %s 23039 Phase 2: Local address = %s, Remote address = %s 23040 , Protocol = 0x%x 23041 , Protocol = Any 23042 , Local port = 0x%x 23043 , Local port = Any 23044 , Remote port = 0x%x 23045 , Remote port = Any 23090 Windows Firewall 23091 Windows Firewall helps protect your computer by preventing unauthorized users from gaining access to your computer through the Internet or a network. 23092 Windows Firewall Authorization Driver 23093 Windows Firewall Authorization Driver is a kernel mode driver that provides deep inspection services on inbound and outbound network traffic. 23094 Allow authenticated IPsec bypass 23095 Allows specific computers to have unrestricted, but authenticated, access to the computer. 23100 Yes 23101 No 23102 Enabled 23103 Disabled 23104 Group Policy 23105 Local Policy 23106 Group and Local Policy 23107 Domain 23108 Private 23109 All interfaces 23110 Off 23111 On 23112 Don't allow exceptions 23113 All subnets 23114 Local subnet only 23115 Custom subnets 23116 Add 23117 Remove 23118 Modify 23119 Allow outgoing destination unreachable 23120 Allow outgoing source quench 23121 Allow redirect 23122 Allow incoming echo request 23123 Allow incoming router request 23124 Allow outgoing time exceeded 23125 Allow outgoing parameter problem 23126 Allow incoming timestamp request 23127 Allow incoming mask request 23128 Allow outgoing packet too big 23129 The rule was parsed successfully form the store 23130 The rule has fields that the service can successfully ignore 23131 The rule has a higher version that the service must ignore 23132 The name contains invalid characters or length 23133 The description contains invalid characters or length 23134 The application contains invalid characters or length 23135 The service contains invalid characters or length 23136 The authorized remote machines list contains invalid characters or length 23137 The authorized remote users list contains invalid characters or length 23138 The embedded context contains invalid characters or length 23139 The rule failed to be parsed correctly 23140 A semantic error: End not equal to Begin, or the port specified was zero (0) 23141 A property on Remote Addresses does not belong to the Remote Address 23142 Number of interfaces and interface buffer don't match 23143 Invalid interface type specified 23144 A rule must have a valid action 23145 A rule must include a valid direction 23146 A semantic error because the protocol and protocol dependent fields don't match 23147 There is a semantic error when considering the fields of the rule in conjunction 23148 An error occurred 23149 Enable Windows Firewall 23150 Disable Stealth Mode 23151 Windows Firewall Shielded Mode 23152 Disable Unicast Responses to Multicast 23153 Log Dropped Packets 23154 Log Successful Connections 23155 Log Ignored Rules 23156 Maximum Log File Size 23157 Log File Path 23158 Disable Inbound Notifications 23159 Allow User preferred merge of Authorized Applications 23160 Allow User preferred merge of Globally open ports 23161 Allow Local Policy Merge 23162 Allow Local IPsec Policy Merge 23163 Disabled Interfaces 23164 Default Outbound Action 23165 Default Inbound Action 23166 Current Profile 23167 Disable Stateful FTP 23168 Disable Stateful PPTP 23169 IPsec SA Idle time 23170 IPsec preshared key encoding 23171 IPsec Exempt 23172 IPsec CRL Check 23173 23174 Allow 23175 Block 23176 The rule Id contains invalid characters or length 23177 The Phase1 auth set Id contains invalid characters or length 23178 The Phase2 crypto set Id contains invalid characters or length 23179 The Phase2 auth set Id contains invalid characters or length 23180 The application name could not be resolved 23181 RuleId not specified 23182 Mismatch in number of ports and ports buffer 23183 Invalid port keyword 23184 Mismatch in number of V4 address subnets and subnets buffer 23185 Mismatch in number of V6 address subnets and subnets buffer 23186 Mismatch in number of V4 address ranges and ranges buffer 23187 Mismatch in number of V6 address ranges and ranges buffer 23188 Address range end is less than begin 23189 Invalid Mask specified on a v4 SubNet 23190 Invalid prefix specified on a V6 subnet 23191 An invalid address keyword was specified 23192 A property on Local Addresses does not belong to the LocalAddress 23193 Mismatch in number of ICMP and ICMP buffer 23194 Invalid ICMP code specified 23195 Allow-Bypass action specified, but the rule does not meet allow-bypass criteria (inbound, authenticate/encrypt flags set, remote machine auth list specified) 23196 Invalid protocol specified 23197 Invalid flags specified 23198 Autogenerate flag is set but Authenticate / Authenticate-encrypt flags not set 23199 Autogenerate flag is set but the action is block 23200 Autogenerate flag is set along with Dynamic RPC flag 23201 Authenticate and Authenticate-encrypt flags both specified 23202 Authorized remote machines or users list specified, but authenticate/encryption flags not set 23203 Number of valid OS Platforms and the list of valid OS Platforms don't match 23204 Phase1 auth set Id not specified 23205 Phase2 crypto set Id not specified 23206 Set Id not specified 23207 Invalid IPsec phase specified 23208 No suites specified in the set 23209 Invalid Phase1 auth method 23210 Invalid Phase2 auth method 23211 Anonymous auth specified as sole auth proposal (suite) 23212 Invalid auth suite flags specified 23213 Machine cert must be Health cert for phase2 auth 23214 Machine Shared Key not specified 23215 CA name not specified 23216 Both machine and user auth specified 23217 Phase 1 crypto set id is not the default 23218 Invalid Phase1 crypto set flags 23219 Invalid Phase1 crypto set timeout minutes 23220 Invalid Phase1 crypto set timeout sessions 23221 Invalid Phase1 crypto set key exchange 23222 Invalid Phase1 crypto set encryption 23223 Invalid Phase1 crypto set hash 23224 Invalid Phase2 crypto set PFS 23225 Invalid Phase2 crypto set protocol 23226 Invalid Phase2 crypto set encryption 23227 Invalid Phase2 crypto set hash 23228 Invalid Phase2 crypto set timeout seconds 23229 Invalid Phase2 crypto set timeout KBytes 23230 Authorized remote users list specified on outbound direction 23231 An unspecified, multicast, broadcast or loopback Ipv6 address was specified 23232 DoNotSecure action specified along with authentication and/or crypto sets 23233 Crypto suite encryption and hash both not specified 23234 Block action was specified in conjunction with require security or require encryption 23235 Main Mode authentication set was not found. 23236 Quick Mode authentication set was not found. 23237 Quick Mode cryptographic set was not found 23238 Specified Main Mode authentication set and Quick Mode authentication set contradict. Quick Mode authentication set cannot be specified when the Main Mode authentication set contains a pre-shared key as an authentication method. 23239 A local address cannot be used in conjunction with either an interface or interface type 23240 Program Name 23241 Interfaces 23242 Local Addresses 23243 Remote Addresses 23244 Local Port 23245 Remote Port 23246 EndPoint 1 Addresses 23247 EndPoint 2 Addresses 23248 Endpoint 1 Port 23249 Endpoint 2 Port 23250 Not Configured 23251 Invalid Profile Type specified 23252 Public 23253 An unspecified, multicast, broadcast or loopback Ipv4 address was specified 23254 Health certs cannot be specified together with regular certs 23255 None 23256 Endpoint 'any' cannot be specified for a tunnel mode rule 23257 IPsec Through NAT 23300 PolicyAgent service hardening - LDAP/TCP 23301 Allow PolicyAgent outbound LDAP/TCP traffic to Active Directory 23302 PolicyAgent service hardening - LDAP/UDP 23303 Allow PolicyAgent outbound LDAP/UDP traffic to Active Directory 23304 PolicyAgent service hardening - Block any other traffic to PolicyAgent 23305 PolicyAgent service hardening - Block any other traffic from PolicyAgent 23306 MpsSvc service hardening - Block any other traffic to MpsSvc 23307 MpsSvc service hardening - Block any other traffic from MpsSvc 23308 Inbound service restriction rule for %1!s! 23309 Block all inbound traffic to service %1!s! 23310 Outbound service restriction rule for %1!s! 23311 Block all outbound traffic from service %1!s! 23500 mpssvc 23501 Windows Firewall 23502 Microsoft Windows Firewall Provider 23503 Windows Firewall Static Session 23504 Windows Firewall Dynamic Session 23505 Boot Time Filter 23506 This filter is in effect before the service starts. 23507 Logging Filter 23508 This filter implements logging, if configured. 23509 Port Scanning Prevention Filter 23510 This filter prevents port scanning. 23511 Loopback Permit Filter 23512 This filter permits loopback traffic. 23513 Secondary Connections Filter 23514 This filter permits secondary connections for protocols (e.g. FTP and PPTP). 23515 Deep Protocol Inspection Filter 23516 This filter implements deep inspection for protocols such as FTP and PPTP. 23517 FTP Inspection Filter 23518 This filter enables inspection of FTP. 23519 PPTP Inspection Filter 23520 This filter enables inspection of PPTP. 23521 Windows IPsec 23522 Windows IPsec 23523 State Management Filter 23524 Indicates different options to WFP to allow customisation of state creation. 23525 State Management Provider Context 23526 Contains State Management Options 23831 UPnP Framework (TCP-In) 23832 Inbound rule for UPnP Framework traffic [TCP] 23833 UPnP Framework (TCP-Out) 23834 Outbound rule for UPnP Framework traffic [TCP] 23835 UPnP Framework (UDP-In) 23836 Inbound rule for UPnP Framework traffic [UDP] 23837 UPnP Framework (UDP-Out) 23838 Outbound rule for UPnP Framework traffic [UDP] 24000 Windows Firewall with Advanced Security 24001 Configure policies that provide enhanced network security for Windows computers. 25000 Core Networking 25001 Core Networking - Packet Too Big (ICMPv6-In) 25002 Core Networking - Packet Too Big (ICMPv6-Out) 25007 Packet Too Big error messages are sent from any node that a packet traverses which is unable to forward the packet because the packet is too large for the next link. 25008 Core Networking - Router Solicitation (ICMPv6-Out) 25011 Router Solicitation messages are sent by nodes seeking routers to provide stateless auto-configuration. 25012 Core Networking - Router Advertisement (ICMPv6-In) 25013 Core Networking - Router Advertisement (ICMPv6-Out) 25018 Router Advertisements are sent to by routers to other nodes for stateless auto-configuration. 25019 Core Networking - Neighbor Discovery Solicitation (ICMPv6-In) 25020 Core Networking - Neighbor Discovery Solicitation (ICMPv6-Out) 25025 Neighbor Discovery Solicitations are sent by nodes to discover the link-layer address of another on-link IPv6 node. 25026 Core Networking - Neighbor Discovery Advertisement (ICMPv6-In) 25027 Core Networking - Neighbor Discovery Advertisement (ICMPv6-Out) 25032 Neighbor Discovery Advertisement messages are sent by nodes to notify other nodes of link-layer address changes or in response to a Neighbor Discovery Solicitation request. 25033 Core Networking - Inverse Neighbor Discovery Solicitation (ICMPv6-In) 25034 Core Networking - Inverse Neighbor Discovery Solicitation (ICMPv6-Out) 25039 Inverse Neighbor Discovery Solicitations are sent by nodes to discover the IP address of another IPv6 node given its link-layer address. 25040 Core Networking - Inverse Neighbor Discovery Advertisement (ICMPv6-In) 25041 Core Networking - Inverse Neighbor Discovery Advertisement (ICMPv6-Out) 25046 Inverse Neighbor Discovery Solicitations are sent by nodes to notify other nodes of IP address changes or in response to an Inverse Neighbor Discovery Solicitation request. 25047 Core Networking - Certificate Path Solicitation (ICMPv6-In) 25048 Core Networking - Certificate Path Solicitation (ICMPv6-Out) 25053 SEND - Secure Neighbor Discovery - Certificate Path Solicitation is a secure version of Neighbor Discovery Solicitation. 25054 Core Networking - Certificate Path Advertisement (ICMPv6-In) 25055 Core Networking - Certificate Path Advertisement (ICMPv6-Out) 25060 SEND - Secure Neighbor Discovery - Certificate Path Advertisement is a secure version of Neighbor Discovery Advertisement. 25061 Core Networking - Multicast Listener Query (ICMPv6-In) 25062 Core Networking - Multicast Listener Query (ICMPv6-Out) 25067 An IPv6 multicast-capable router uses the Multicast Listener Query message to query a link for multicast group membership. 25068 Core Networking - Multicast Listener Report (ICMPv6-In) 25069 Core Networking - Multicast Listener Report (ICMPv6-Out) 25074 The Multicast Listener Report message is used by a listening node to either immediately report its interest in receiving multicast traffic at a specific multicast address or in response to a Multicast Listener Query. 25075 Core Networking - Multicast Listener Report v2 (ICMPv6-In) 25076 Core Networking - Multicast Listener Report v2 (ICMPv6-Out) 25081 Multicast Listener Report v2 message is used by a listening node to either immediately report its interest in receiving multicast traffic at a specific multicast address or in response to a Multicast Listener Query. 25082 Core Networking - Multicast Listener Done (ICMPv6-In) 25083 Core Networking - Multicast Listener Done (ICMPv6-Out) 25088 Multicast Listener Done messages inform local routers that there are no longer any members remaining for a specific multicast address on the subnet. 25089 Core Networking - Multicast Router Advertisement (ICMPv6-In) 25090 Core Networking - Multicast Router Advertisement (ICMPv6-Out) 25095 Multicast Router Advertisement messages are sent by routers to advertise that IP multicast forwarding is enabled. 25096 Core Networking - Multicast Router Solicitation (ICMPv6-In) 25097 Core Networking - Multicast Router Solicitation (ICMPv6-Out) 25102 Multicast Router Solicitation messages are sent in order to discover routers with IP multicast forwarding enabled. 25103 Core Networking - Multicast Router Termination (ICMPv6-In) 25104 Core Networking - Multicast Router Termination (ICMPv6-Out) 25109 Multicast Router Termination messages are sent when a router stops IP multicast routing functions on an interface. 25110 Core Networking - Destination Unreachable (ICMPv6-In) 25111 Core Networking - Destination Unreachable (ICMPv6-Out) 25112 Destination Unreachable error messages are sent from any node that a packet traverses which is unable to forward the packet for any reason except congestion. 25113 Core Networking - Time Exceeded (ICMPv6-In) 25114 Core Networking - Time Exceeded (ICMPv6-Out) 25115 Time Exceeded error messages are generated from any node that a packet traverses if the Hop Limit value is decremented to zero at any point on the path. 25116 Core Networking - Parameter Problem (ICMPv6-In) 25117 Core Networking - Parameter Problem (ICMPv6-Out) 25118 Parameter Problem error messages are sent by nodes as a result of incorrectly generated packets. 25251 Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-In) 25252 Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-Out) 25257 Destination Unreachable Fragmentation Needed error messages are sent from any node that a packet traverses which is unable to forward the packet because fragmentation was needed and the don t fragment bit was set. 25301 Core Networking - Dynamic Host Configuration Protocol (DHCP-In) 25302 Core Networking - Dynamic Host Configuration Protocol (DHCP-Out) 25303 Allows DHCP (Dynamic Host Configuration Protocol) messages for stateful auto-configuration. 25326 Core Networking - Teredo (UDP-In) 25327 Core Networking - Teredo (UDP-Out) 25332 Inbound UDP rule to allow Teredo edge traversal, a technology that provides address assignment and automatic tunneling for unicast IPv6 traffic when an IPv6/IPv4 host is located behind an IPv4 network address translator. 25333 Outbound UDP rule to allow Teredo edge traversal, a technology that provides address assignment and automatic tunneling for unicast IPv6 traffic when an IPv6/IPv4 host is located behind an IPv4 network address translator. 25351 Core Networking - IPv6 (IPv6-In) 25352 Core Networking - IPv6 (IPv6-Out) 25357 Inbound rule required to permit IPv6 traffic for ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) and 6to4 tunneling services. 25358 Outbound rule required to permit IPv6 traffic for ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) and 6to4 tunneling services. 25376 Core Networking - Internet Group Management Protocol (IGMP-In) 25377 Core Networking - Internet Group Management Protocol (IGMP-Out) 25382 IGMP messages are sent and received by nodes to create, join and depart multicast groups. 25401 Core Networking - Group Policy (NP-Out) 25402 Outbound rule to allow SMB traffic for Group Policy updates. [TCP 445] 25403 Core Networking - Group Policy (TCP-Out) 25404 Outbound rule to allow remote RPC traffic for Group Policy updates. [TCP] 25405 Core Networking - DNS (UDP-Out) 25406 Outbound rule to allow DNS requests. DNS responses based on requests that matched this rule will be permitted regardless of source address. This behavior is classified as loose source mapping. [LSM] [UDP 53] 25407 Core Networking - Group Policy (LSASS-Out) 25408 Outbound rule to allow remote LSASS traffic for Group Policy updates [TCP]. 26008 Networking - Destination Unreachable (ICMPv4-In) 26009 Networking - Destination Unreachable (ICMPv4-Out) 26014 Destination Unreachable error messages are sent from any node that a packet traverses which is unable to forward the packet for any reason except congestion. 26015 Networking - Source Quench (ICMPv4-In) 26016 Networking - Source Quench (ICMPv4-Out) 26021 Source Quench messages are sent from any node that a packet traverses which discards the datagram because they are arriving too fast or there are buffering issues. 26022 Networking - Redirect (ICMPv4-In) 26023 Networking - Redirect (ICMPv4-Out) 26028 Redirect messages are sent to indicate that the node which the packet was sent to is no longer the best gateway to reach the network in question. 26036 Networking - Time Exceeded (ICMPv4-In) 26037 Networking - Time Exceeded (ICMPv4-Out) 26042 Time Exceeded error messages are generated from any node which a packet traverses if the Hop Limit value is decremented to zero at any point on the path. 26043 Networking - Timestamp Request (ICMPv4-In) 26044 Networking - Timestamp Request (ICMPv4-Out) 26049 Timestamp Request messages are sent by nodes who wish to obtain the current timestamp from another node. 26057 Networking - Parameter Problem (ICMPv4-In) 26058 Networking - Parameter Problem (ICMPv4-Out) 26063 Parameter Problem error messages are sent by nodes as a result of incorrectly generated packets. 26078 Networking - Redirect (ICMPv6-In) 26079 Networking - Redirect (ICMPv6-Out) 26084 Redirect messages are sent to indicate that the node which the packet was sent to is no longer the best gateway to reach the network in question. 26106 Networking - Router Solicitation (ICMPv6-In) 26109 Router Solicitation messages are sent by nodes seeking routers to provide stateless auto-configuration. 26117 Networking - Generic Routing Encapsulation (GRE-In) 26118 Networking - Generic Routing Encapsulation (GRE-Out) 26123 Generic Routing Encapsulation is used for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. 26124 Networking - PGM Reliable Transport Protocol (PGM-In) 26125 Networking - PGM Reliable Transport Protocol (PGM-Out) 26130 Pragmatic General Multicast is a reliable multicast transport protocol used for applications that require ordered or unordered, duplicate-free, multicast data delivery from multiple sources to multiple receivers. 26131 Networking - Packet Too Big (ICMPv4-In) 26132 Networking - Packet Too Big (ICMPv4-Out) 26133 Packet Too Big error messages are sent from any node that a packet traverses which is unable to forward the packet because the packet is too large for the next link. 26134 Networking - Router Solicitation (ICMPv4-In) 26135 Networking - Router Solicitation (ICMPv4-Out) 26136 Router Solicitation messages are sent by nodes seeking routers to provide stateless auto-configuration. 26137 Networking - Address Mask Request (ICMPv4-In) 26138 Networking - Address Mask Request (ICMPv4-Out) 26139 Address Mask Request messages are sent by nodes who wish to obtain the subnet mask for their assigned address. 26140 Networking - Echo Request (ICMPv4-In) 26141 Networking - Echo Request (ICMPv4-Out) 26142 Networking - Echo Request (ICMPv6-In) 26143 Networking - Echo Request (ICMPv6-Out) 26144 Echo Request messages are sent as ping requests to other nodes. 28002 Key Management Service 28003 Key Management Service (TCP-In) 28006 Inbound rule for the Key Management Service to allow for machine counting and license compliance. [TCP 1688] 28252 BITS Peercaching 28254 BITS Peercaching (WSD-In) 28257 Inbound rule for BITS Peercaching to discover neighbors who may have content via WSDAPI. [UDP 3702] 28258 BITS Peercaching (WSD-Out) 28261 Outbound rule for BITS Peercaching to discover neighbors who may have content via WSDAPI. [UDP 3702] 28262 BITS Peercaching (Content-In) 28265 Inbound rule for BITS Peercaching content transfer port. [TCP 2178] 28266 BITS Peercaching (Content-Out) 28269 Outbound rule for BITS Peercaching content transfer port. [TCP 2178] 28270 BITS Peercaching (RPC) 28273 Inbound rule for the Peercaching authorization exchange port via dynamic RPC/TCP. 28274 BITS Peercaching (RPC-EPMAP) 28277 Inbound rule for the RPCSS service in order to allow RPC/TCP traffic for BITS Peercaching. 28502 File and Printer Sharing 28503 File and Printer Sharing (NB-Session-In) 28506 Inbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139] 28507 File and Printer Sharing (NB-Session-Out) 28510 Outbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139] 28511 File and Printer Sharing (SMB-In) 28514 Inbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP 445] 28515 File and Printer Sharing (SMB-Out) 28518 Outbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP 445] 28519 File and Printer Sharing (NB-Name-In) 28522 Inbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137] 28523 File and Printer Sharing (NB-Name-Out) 28526 Outbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137] 28527 File and Printer Sharing (NB-Datagram-In) 28530 Inbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP 138] 28531 File and Printer Sharing (NB-Datagram-Out) 28534 Outbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP 138] 28535 File and Printer Sharing (Spooler Service - RPC) 28538 Inbound rule for File and Printer Sharing to allow the Print Spooler Service to communicate via TCP/RPC. 28539 File and Printer Sharing (Spooler Service - RPC-EPMAP) 28542 Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Spooler Service. 28543 File and Printer Sharing (Echo Request - ICMPv4-In) 28544 File and Printer Sharing (Echo Request - ICMPv4-Out) 28545 File and Printer Sharing (Echo Request - ICMPv6-In) 28546 File and Printer Sharing (Echo Request - ICMPv6-Out) 28547 Echo Request messages are sent as ping requests to other nodes. 28752 Remote Desktop 28753 Remote Desktop (TCP-In) 28756 Inbound rule for the Remote Desktop service to allow RDP traffic. [TCP 3389] 29002 iSCSI Service 29003 iSCSI Service (TCP-In) 29006 Inbound rule for the iSCSI Service to allow communications with an iSCSI server or device. [TCP] 29007 iSCSI Service (TCP-Out) 29010 Outbound rule for the iSCSI Service to allow communications with an iSCSI server or device. [TCP] 29252 Remote Event Log Management 29253 Remote Event Log Management (RPC) 29256 Inbound rule for the local Event Log service to be remotely managed via RPC/TCP. 29257 Remote Event Log Management (NP-In) 29260 Inbound rule for the local Event Log service to be remotely managed over Named Pipes. 29265 Remote Event Log Management (RPC-EPMAP) 29268 Inbound rule for the RPCSS service to allow RPC/TCP traffic for the local Event Log Service. 29502 Remote Service Management 29503 Remote Service Management (RPC) 29506 Inbound rule for the local Service Control Manager to be remotely managed via RPC/TCP. 29507 Remote Service Management (NP-In) 29510 Inbound rule for the local Service Control Manager to be remotely managed over Named Pipes. 29515 Remote Service Management (RPC-EPMAP) 29518 Inbound rule for the RPCSS service to allow RPC/TCP traffic for the local Service Control Manager. 29752 Remote Administration 29753 Remote Administration (RPC) 29756 Inbound rule for all services to be remotely managed via RPC/TCP. 29757 Remote Administration (NP-In) 29760 Inbound rule for all services to be remotely managed over Named Pipes. 29765 Remote Administration (RPC-EPMAP) 29768 Inbound rule for the RPCSS service to allow RPC/TCP traffic for all the local services. 30002 Windows Firewall Remote Management 30003 Windows Firewall Remote Management (RPC) 30006 Inbound rule for the Windows Firewall to be remotely managed via RPC/TCP. 30007 Windows Firewall Remote Management (RPC-EPMAP) 30010 Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Windows Firewall. 30252 Windows Remote Management 30253 Windows Remote Management (HTTP-In) 30256 Inbound rule for Windows Remote Management via WS-Management. [TCP 80] 30502 Wireless Portable Devices 30503 Wireless Portable Devices (TCP-Out) 30506 Outbound rule for Wireless Portable Devices to allow use of the Usermode Driver Framework. [TCP] 30507 Wireless Portable Devices (SSDP-In) 30510 Inbound rule for Wireless Portable Devices to allow use of the Simple Service Discovery Protocol. [UDP 1900] 30511 Wireless Portable Devices (SSDP-Out) 30514 Outbound rule for Wireless Portable Devices to allow use of the Simple Service Discovery Protocol. [UDP 1900] 30515 Wireless Portable Devices (UPnP-In) 30518 Inbound rule for Wireless Portable Devices to allow use of Universal Plug and Play. [TCP 2869] 30519 Wireless Portable Devices (UPnP-Out) 30522 Outbound rule for Wireless Portable Devices to allow use of Universal Plug and Play. [TCP] 30523 Wireless Portable Devices (UPnPHost-Out) 30524 Outbound rule for Wireless Portable Devices to allow use of Universal Plug and Play. [TCP] 30752 Media Center Extenders 30753 Media Center Extenders (SSDP-In) 30756 Inbound rule for Media Center Extenders to allow use of the Simple Service Discovery Protocol. [UDP 1900] 30757 Media Center Extenders (SSDP-Out) 30760 Outbound rule for Media Center Extenders to allow use of the Simple Service Discovery Protocol. [UDP 1900] 30761 Media Center Extenders (RTSP-In) 30764 Inbound rule for Media Center Extenders to allow RTSP AV Control. [TCP 554, TCP 8554-8558] 30765 Media Center Extenders (RTSP-Out) 30768 Outbound rule for Media Center Extenders to allow WMDRM-ND and RTSP AV Control. [TCP] 30769 Media Center Extenders (qWave-UDP-In) 30772 Inbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] 30773 Media Center Extenders (qWave-UDP-Out) 30776 Outbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] 30777 Media Center Extenders (qWave-TCP-In) 30780 Inbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] 30781 Media Center Extenders (qWave-TCP-Out) 30784 Outbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] 30785 Media Center Extenders (HTTP-Streaming-In) 30788 Inbound rule for Media Center Extenders to allow HTTP Media Streaming. [TCP 10244] 30789 Media Center Extenders (HTTP-Streaming-Out) 30792 Outbound rule for Media Center Extenders to allow HTTP Media Streaming. [TCP 10244] 30793 Media Center Extenders (RDP-In) 30796 Inbound rule for Media Center Extenders to allow terminal sessions. [TCP 3390] 30801 Media Center Extenders (WMDRM-ND/RTP/RTCP-In) 30804 Inbound rule for Media Center Extenders to allow WMDRM-ND and RTP/RTCP AV Streaming. [UDP 7777-7781, UDP 5005-5005, UDP 50004-50013] 30805 Media Center Extenders (WMDRM-ND/RTP/RTCP-In) 30808 Outbound rule for Media Center Extenders to allow WMDRM-ND and RTP/RTCP AV Streaming. [UDP] 30810 Media Center Extenders (Service-Out) 30811 Outbound rule for Media Center Extenders to allow extender devices to locate and connect to the computer. [TCP] 30812 Media Center Extenders (Provisioning Library-Out) 30813 Outbound rule for Media Center Extenders to allow traffic from the provisioning library. [TCP] 31002 Windows Media Player 31003 Windows Media Player (UDP-In) 31006 Inbound rule for Windows Media Player to allow UDP Media Streaming. [UDP] 31007 Windows Media Player (UDP-Out) 31010 Outbound rule for Windows Media Player to allow UDP Media Streaming. [UDP] 31011 Windows Media Player (TCP-Out) 31014 Outbound rule for Windows Media Player to allow TCP/HTTP Media Streaming. [TCP] 31015 Windows Media Player - Internet Group Management Protocol (IGMP-In) 31018 Inbound rule for Windows Media Player to allow IGMP messages. 31019 Windows Media Player - Internet Group Management Protocol (IGMP-Out) 31022 Outbound rule for Windows Media Player to allow IGMP messages. 31023 Windows Media Player x86 (UDP-In) 31024 Windows Media Player x86 (UDP-Out) 31025 Windows Media Player x86 (TCP-Out) 31252 Windows Media Player Network Sharing Service 31253 Windows Media Player Network Sharing Service (qWave-UDP-In) 31256 Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] 31257 Windows Media Player Network Sharing Service (qWave-UDP-Out) 31260 Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177] 31261 Windows Media Player Network Sharing Service (qWave-TCP-In) 31264 Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] 31265 Windows Media Player Network Sharing Service (qWave-TCP-Out) 31268 Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177] 31269 Windows Media Player Network Sharing Service (SSDP-In) 31272 Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] 31273 Windows Media Player Network Sharing Service (SSDP-Out) 31276 Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] 31277 Windows Media Player Network Sharing Service (UPnP-In) 31280 Inbound rule for the Windows Media Player Network Sharing Service to allow use of Universal Plug and Play. [TCP 2869] 31281 Windows Media Player Network Sharing Service (UPnP-Out) 31284 Outbound rule for the Windows Media Player Network Sharing Service to allow use of Universal Plug and Play. [TCP] 31285 Windows Media Player Network Sharing Service (HTTP-Streaming-In) 31288 Inbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10243] 31289 Windows Media Player Network Sharing Service (HTTP-Streaming-Out) 31292 Outbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10243] 31293 Windows Media Player Network Sharing Service (Streaming-UDP-In) 31296 Inbound rule for Windows Media Player to allow UDP Media Streaming. [UDP] 31297 Windows Media Player Network Sharing Service (Streaming-UDP-Out) 31300 Outbound rule for Windows Media Player to allow UDP Media Streaming. [UDP] 31301 Windows Media Player Network Sharing Service (Streaming-TCP-Out) 31304 Outbound rule for Windows Media Player to allow TCP/HTTP Media Streaming. [TCP] 31305 Windows Media Player Network Sharing Service (UDP-In) 31308 Inbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [UDP] 31309 Windows Media Player Network Sharing Service (UDP-Out) 31312 Outbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [UDP] 31313 Windows Media Player Network Sharing Service (TCP-In) 31316 Inbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [TCP] 31317 Windows Media Player Network Sharing Service (TCP-Out) 31320 Outbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [TCP] 31321 Windows Media Player Network Sharing Service (UPnPHost-Out) 31322 Outbound rule for the Windows Media Player Network Sharing Service to allow use of Universal Plug and Play. [TCP] 31323 Windows Media Player Network Sharing Service x86 (Streaming-UDP-In) 31324 Windows Media Player Network Sharing Service x86 (Streaming-UDP-Out) 31325 Windows Media Player Network Sharing Service x86 (Streaming-TCP-Out) 31752 Connect to a Network Projector 31753 Connect to a Network Projector (WSD-In) 31756 Inbound rule for Connect to a Network Projector to discover devices via WSDAPI. [UDP 3702] 31757 Connect to a Network Projector (WSD-Out) 31760 Outbound rule for Connect to a Network Projector to discover devices via WSDAPI. [UDP 3702] 31761 Connect to a Network Projector (TCP-In) 31764 Inbound rule for Connect to a Network Projector to communicate with devices on the network. [TCP] 31765 Connect to a Network Projector (TCP-Out) 31768 Outbound rule for Connect to a Network Projector to communicate with devices on the network. [TCP] 31769 Connect to a Network Projector (WSD Events-In) 31770 Inbound rule for Connect to a Network Projector to allow WSDAPI Events Discovery. [TCP 5357] 31771 Connect to a Network Projector (WSD Events-Out) 31772 Outbound rule for Connect to a Network Projector to allow WSDAPI Events Discovery. [TCP 5358] 31773 Connect to a Network Projector (WSD EventsSecure-In) 31774 Inbound rule for Connect to a Network Projector to allow Secure WSDAPI Events. [TCP 5358] 31775 Connect to a Network Projector (WSD EventsSecure-Out) 31776 Outbound rule for Connect to a Network Projector to allow Secure WSDAPI Events. [TCP 5358] 32002 Windows Peer to Peer Collaboration Foundation 32003 Windows Peer to Peer Collaboration Foundation (TCP-In) 32006 Inbound rule for the Windows Peer to Peer Collaboration Foundation for Peer to Peer Communication. [TCP] 32007 Windows Peer to Peer Collaboration Foundation (TCP-Out) 32010 Inbound rule for the Windows Peer to Peer Collaboration Foundation for Peer to Peer Communication. [TCP] 32011 Windows Peer to Peer Collaboration Foundation (WSD-In) 32014 Inbound rule for the Windows Peer to Peer Collaboration Foundation to discover devices via WSDAPI. [UDP 3702] 32015 Windows Peer to Peer Collaboration Foundation (WSD-Out) 32018 Outbound rule for the Windows Peer to Peer Collaboration Foundation to discover devices via WSDAPI. [UDP 3702] 32019 Windows Peer to Peer Collaboration Foundation (PNRP-In) 32022 Inbound rule for the Windows Peer to Peer Collaboration Foundation to allow Peer Name Resolution. [UDP 3540] 32023 Windows Peer to Peer Collaboration Foundation (PNRP-Out) 32026 Outbound rule for the Windows Peer to Peer Collaboration Foundation to allow Peer Name Resolution. [UDP 3540] 32027 Windows Peer to Peer Collaboration Foundation (SSDP-In) 32030 Inbound rule for the Windows Peer to Peer Collaboration Foundation to allow use of the Simple Service Discovery Protocol. [UDP 1900] 32031 Windows Peer to Peer Collaboration Foundation (SSDP-Out) 32034 Outbound rule for the Windows Peer to Peer Collaboration Foundation to allow use of the Simple Service Discovery Protocol. [UDP 1900] 32252 Windows Meeting Space 32253 Windows Meeting Space (DFSR-In) 32256 Inbound rule for Windows Meeting Space to allow Distributed File System Replication traffic. [TCP 5722] 32257 Windows Meeting Space (DFSR-Out) 32260 Outbound rule for Windows Meeting Space to allow Distributed File System Replication traffic. [TCP 5722] 32261 Windows Meeting Space (TCP-In) 32264 Inbound rule for Windows Meeting Space to allow collaboration traffic. [TCP] 32265 Windows Meeting Space (TCP-Out) 32268 Outbound rule for Windows Meeting Space to allow collaboration traffic. [TCP] 32269 Windows Meeting Space (UDP-In) 32272 Inbound rule for Windows Meeting Space to allow collaboration traffic. [UDP] 32273 Windows Meeting Space (UDP-Out) 32276 Outbound rule for Windows Meeting Space to allow collaboration traffic. [UDP] 32277 Windows Meeting Space (P2P-In) 32280 Inbound rule for Windows Meeting Space to allow Peer Networking traffic. [TCP 3587] 32281 Windows Meeting Space (P2P-Out) 32284 Outbound rule for Windows Meeting Space to allow Peer Networking traffic. [TCP 3587] 32752 Network Discovery 32753 Network Discovery (SSDP-In) 32756 Inbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900] 32757 Network Discovery (SSDP-Out) 32760 Outbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900] 32761 Network Discovery (UPnP-In) 32764 Inbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP 2869] 32765 Network Discovery (UPnP-Out) 32768 Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP] 32769 Network Discovery (NB-Name-In) 32772 Inbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137] 32773 Network Discovery (NB-Name-Out) 32776 Outbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137] 32777 Network Discovery (NB-Datagram-In) 32780 Inbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138] 32781 Network Discovery (NB-Datagram-Out) 32784 Outbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138] 32785 Network Discovery (WSD-In) 32788 Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702] 32789 Network Discovery (WSD-Out) 32792 Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702] 32801 Network Discovery (LLMNR-UDP-In) 32804 Inbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355] 32805 Network Discovery (LLMNR-UDP-Out) 32808 Outbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355] 32809 Network Discovery (Pub-WSD-In) 32810 Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702] 32811 Network Discovery (Pub WSD-Out) 32812 Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702] 32813 Network Discovery (WSD EventsSecure-In) 32814 Inbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358] 32815 Network Discovery (WSD EventsSecure-Out) 32816 Outbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358] 32817 Network Discovery (WSD Events-In) 32818 Inbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357] 32819 Network Discovery (WSD Events-Out) 32820 Outbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357] 32821 Network Discovery (UPnPHost-Out) 32822 Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP] 33002 Remote Assistance 33003 Remote Assistance (TCP-In) 33006 Inbound rule for Remote Assistance traffic. [TCP] 33007 Remote Assistance (TCP-Out) 33010 Outbound rule for Remote Assistance traffic. [TCP] 33011 Remote Assistance (RA Server TCP-In) 33014 Inbound rule for Remote Assistance to allow offers for assistance. [TCP] 33015 Remote Assistance (RA Server TCP-Out) 33018 Outbound rule for Remote Assistance to allow offers for assistance. [TCP] 33019 Remote Assistance (SSDP-In) 33022 Inbound rule for Remote Assistance to allow use of the Simple Service Discovery Protocol. [UDP 1900] 33023 Remote Assistance (SSDP-Out) 33026 Outbound rule for Remote Assistance to allow use of the Simple Service Discovery Protocol. [UDP 1900] 33027 Remote Assistance (UPnP-In) 33030 Inbound rule for Remote Assistance to allow use of Universal Plug and Play. [TCP 2869] 33031 Remote Assistance (UPnP-Out) 33034 Outbound rule for Remote Assistance to allow use of Universal Plug and Play. [TCP] 33035 Remote Assistance (DCOM-In) 33036 Inbound rule for Remote Assistance to allow offers for assistance via DCOM. [TCP 135] 33037 Remote Assistance (UPnPHost-Out) 33038 Outbound rule for Remote Assistance to allow use of Universal Plug and Play. [TCP] 33252 Remote Scheduled Tasks Management 33253 Remote Scheduled Tasks Management (RPC) 33256 Inbound rule for the Task Scheduler service to be remotely managed via RPC/TCP. 33257 Remote Scheduled Tasks Management (RPC-EPMAP) 33260 Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Task Scheduler service. 33502 Distributed Transaction Coordinator 33503 Distributed Transaction Coordinator (TCP-In) 33506 Inbound rule to allow traffic for the Distributed Transaction Coordinator. [TCP] 33507 Distributed Transaction Coordinator (TCP-Out) 33510 Outbound rule to allow traffic for the Distributed Transaction Coordinator. [TCP] 33511 Distributed Transaction Coordinator (RPC) 33512 Inbound rule for the Kernel Transaction Resource Manager for Distributed Transaction Coordinator service to be remotely managed via RPC/TCP. 33513 Distributed Transaction Coordinator (RPC-EPMAP) 33514 Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Kernel Transaction Resource Manager for Distributed Transaction Coordinator service. 33752 Routing and Remote Access 33753 Routing and Remote Access (L2TP-In) 33756 Inbound rule for RRAS to allow Layer 2 Tunnel Protocol traffic. [UDP 1701] 33757 Routing and Remote Access (L2TP-Out) 33760 Outbound rule for RRAS to allow Layer 2 Tunnel Protocol traffic. [UDP 1701] 33761 Routing and Remote Access (PPTP-Out) 33764 Outbound rule for RRAS to allow Point-to-Point Tunnel Protocol traffic. [TCP 1723] 33765 Routing and Remote Access (PPTP-In) 33768 Inbound rule for RRAS to allow Point-to-Point Tunnel Protocol traffic. [TCP 1723] 33769 Routing and Remote Access (GRE-In) 33772 Inbound rule for RRAS to allow Generic Routing Encapsulation Protocol traffic. 33773 Routing and Remote Access (GRE-Out) 33776 Outbound rule for RRAS to allow Generic Routing Encapsulation Protocol Traffic 34002 Windows Collaboration Computer Name Registration Service 34003 Windows Collaboration Computer Name Registration Service (PNRP-In) 34004 Inbound rule for the Windows Collaboration Computer Name Registration Service to allow Peer Name Resolution. [UDP 3540] 34005 Windows Collaboration Computer Name Registration Service (PNRP-Out) 34006 Outbound rule for the Windows Collaboration Computer Name Registration Service to allow Peer Name Resolution. [UDP 3540] 34007 Windows Collaboration Computer Name Registration Service (SSDP-In) 34008 Inbound rule for the Windows Collaboration Computer Name Registration Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] 34009 Windows Collaboration Computer Name Registration Service (SSDP-Out) 34010 Outbound rule for the Windows Collaboration Computer Name Registration Service to allow use of the Simple Service Discovery Protocol. [UDP 1900] 34251 Windows Management Instrumentation (WMI) 34252 Windows Management Instrumentation (DCOM-In) 34253 Inbound rule to allow DCOM traffic for remote Windows Management Instrumentation. [TCP 135] 34254 Windows Management Instrumentation (WMI-In) 34255 Inbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP] 34256 Windows Management Instrumentation (ASync-In) 34257 Inbound rule to allow Asynchronous WMI traffic for remote Windows Management Instrumentation. [TCP] 34258 Windows Management Instrumentation (WMI-Out) 34259 Outbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP] 34501 Remote Volume Management 34502 Remote Volume Management - Virtual Disk Service (RPC) 34503 Inbound rule for the Remote Volume Management - Virtual Disk Service to be remotely managed via RPC/TCP. 34504 Remote Volume Management - Virtual Disk Service Loader (RPC) 34505 Inbound rule for the Remote Volume Management - Virtual Disk Service Loader to be remotely managed via RPC/TCP. 34506 Remote Volume Management (RPC-EPMAP) 34507 Inbound rule for the RPCSS service to allow RPC/TCP traffic for Remote Volume Management. 35000 The firewall rules that are part of Core Networking are required for reliable IPv4 and IPv6 connectivity. 38002 This feature is used for machine counting and license compliance in enterprise environments. 38252 This feature allows Background Intelligent Transfer Service (BITS) clients that are in the same subnet to locate and share files that are stored in the BITS cache. (Uses WSDAPI and RPC) 38502 This feature is used for sharing local files and printers with other users on the network. (Uses NetBIOS, SMB and RPC) 38752 This feature is used for accessing the desktop from a remote system. 39002 This feature is used for connecting to iSCSI target servers and devices. 39252 This feature allows remote viewing and management of the local event log. (Uses Named Pipes and RPC) 39502 This feature allows remote management of local services. (Uses Named Pipes and RPC) 39752 The feature allows remotely manageable services to receive RPC traffic. (Uses Named Pipes and RPC) 40002 This feature allows remote management of the local Windows Firewall. (Uses RPC) 40252 This feature allows remote management of the system via WS-Management, a web services-based protocol for remote management of operating systems and devices. 40502 This feature allows the transfer of media from your network enabled camera or media device to your computer using the Media Transfer Protocol (MTP). (Uses UPnP and SSDP) 40752 This feature allows Media Center Extenders to communicate with a computer running Windows Media Center. (Uses SSDP and qWave) 41002 This feature allows users to receive streaming media over UDP. 41252 This feature enables users to share media over a network. (Uses UPnP, SSDP and qWave) 41752 This feature enables users to connect to projectors over wired or wireless networks to project presentations. (Uses WSDAPI) 42002 This feature is required to enable various peer-to-peer programs and technologies. (Uses SSDP and PNRP) 42252 This feature is used for collaborating over a network to share documents, programs or your desktop with other people. (Uses DFSR and P2P) 42752 This feature allows this computer to discover other devices and be discovered by other devices on the network. (Uses Function Discovery Host and Publication Services, UPnP, SSDP, NetBIOS and LLMNR) 43002 This feature allows users of this computer to request remote assistance from other users on the network. (Uses UPnP, SSDP and Teredo) 43252 This feature allows remote management of the local task scheduling service. (Uses RPC) 43502 This feature coordinates transactions that update transaction-protected resources, such as databases, message queues and file systems. 43752 This feature is used to allow incoming VPN and RAS connections. 44002 This feature allows other computers to find and communicate with your computer using the Peer Name Resolution Protocol. (Uses SSDP and PNRP) 44251 This feature allows remote management of Windows by exposing a set of manageable components in a set of classes defined by the Common Information Model (CIM) of the distributed management task force. (Uses DCOM) 44501 This feature provides remote software and hardware disk volume management. (Uses RPC)