I selected “Yes” on both options in this case. And a successful connection refers to both incoming connections as well as any connections you have made over to the Internet. The dropped packets are those network traffics that have been blocked by Windows Firewall. In the dialog box that pops up, specify where you want to save the log file, the maximum log size, and whether to log dropped packets and successful connections.
The following dialog box shows up.Ĭlick Customize… button in the Logging section. Then, click Properties link on the right side of the screen. Press Win+R, type wf.msc, and press Enter. You need to open Windows 8’s Windows Firewall with Advanced Security feature first. This article is to show you how to turn on this tracking feature to keep a much detailed log and how to access them.
With these information, you can find out whether your PC has been targeted, and what kinds of attacks the Firewall has countered back. The Windows Firewall has been developed to a very effective working firewall product that not only stands between you and intruders protecting you from being attacked but also allows you to keep track of all intrusion attempts as well.