<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Listing Windows Firewall Rules Using Microsoft PowerShell	</title>
	<atom:link href="https://www.carlwebster.com/listing-windows-firewall-rules-using-microsoft-powershell/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.carlwebster.com/listing-windows-firewall-rules-using-microsoft-powershell/</link>
	<description>The Accidental Citrix Admin - The site for those who find themselves supporting Citrix involuntarily or accidentally</description>
	<lastBuildDate>Sat, 29 May 2021 15:30:47 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
	<item>
		<title>
		By: Carl Webster		</title>
		<link>https://www.carlwebster.com/listing-windows-firewall-rules-using-microsoft-powershell/comment-page-1/#comment-565</link>

		<dc:creator><![CDATA[Carl Webster]]></dc:creator>
		<pubDate>Fri, 02 Dec 2016 14:47:58 +0000</pubDate>
		<guid isPermaLink="false">https://www.carlwebster.com/?p=5010#comment-565</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.carlwebster.com/listing-windows-firewall-rules-using-microsoft-powershell/comment-page-1/#comment-564&quot;&gt;Garrett&lt;/a&gt;.

Correct. The HNetCfg.FWPolicy2 comObject only contains the local firewall rules. Starting with Windows 8 and Serer 2012, you now have the Get-NetFirewallRule cmdlet that has a lot more features.

Thanks

Webster]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.carlwebster.com/listing-windows-firewall-rules-using-microsoft-powershell/comment-page-1/#comment-564">Garrett</a>.</p>
<p>Correct. The HNetCfg.FWPolicy2 comObject only contains the local firewall rules. Starting with Windows 8 and Serer 2012, you now have the Get-NetFirewallRule cmdlet that has a lot more features.</p>
<p>Thanks</p>
<p>Webster</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Garrett		</title>
		<link>https://www.carlwebster.com/listing-windows-firewall-rules-using-microsoft-powershell/comment-page-1/#comment-564</link>

		<dc:creator><![CDATA[Garrett]]></dc:creator>
		<pubDate>Thu, 27 Oct 2016 13:20:28 +0000</pubDate>
		<guid isPermaLink="false">https://www.carlwebster.com/?p=5010#comment-564</guid>

					<description><![CDATA[This is awesome but it only shows locally created Firewall Rules, it doesn&#039;t list any GPO applied.]]></description>
			<content:encoded><![CDATA[<p>This is awesome but it only shows locally created Firewall Rules, it doesn&#8217;t list any GPO applied.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Stevo		</title>
		<link>https://www.carlwebster.com/listing-windows-firewall-rules-using-microsoft-powershell/comment-page-1/#comment-563</link>

		<dc:creator><![CDATA[Stevo]]></dc:creator>
		<pubDate>Wed, 20 Jul 2016 12:26:25 +0000</pubDate>
		<guid isPermaLink="false">https://www.carlwebster.com/?p=5010#comment-563</guid>

					<description><![CDATA[If you pipe the output to the &quot;Export-Csv&quot; option instead of the &quot;Format-Table&quot; option, you get all characters in each column without any loss. Then you can simply open it in your favourite CSV program.

https://technet.microsoft.com/en-us/library/hh849932.aspx

HTH]]></description>
			<content:encoded><![CDATA[<p>If you pipe the output to the &#8220;Export-Csv&#8221; option instead of the &#8220;Format-Table&#8221; option, you get all characters in each column without any loss. Then you can simply open it in your favourite CSV program.</p>
<p><a href="https://technet.microsoft.com/en-us/library/hh849932.aspx" rel="nofollow ugc">https://technet.microsoft.com/en-us/library/hh849932.aspx</a></p>
<p>HTH</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
