The firewall capabilities to block unwanted traffic is what it is responsible for, yet the ability to log all the traffic events is often overlooked. Run 'firewall.cpl' applet, choose the 'Advanced' tab and select 'Settings', below security logging title.
There are several logging options found. First, you can choose whether or not to log the dropped packets (those stopped by firewall), successful connections (allowed by firewall) or both. You can also select where the log file should be situated. The latter could be useful if you choose a mapped network drive to store log files onto. Finally, you can specify the maximal size of log files.
Keeping these log files could be of much use in cases there are attempts of unauthorized network access, other suspicious network activity or other problems that might be related to firewall.
There are several logging options found. First, you can choose whether or not to log the dropped packets (those stopped by firewall), successful connections (allowed by firewall) or both. You can also select where the log file should be situated. The latter could be useful if you choose a mapped network drive to store log files onto. Finally, you can specify the maximal size of log files.
Keeping these log files could be of much use in cases there are attempts of unauthorized network access, other suspicious network activity or other problems that might be related to firewall.