Every modern Windows operating system includes the built-in firewall "Windows Defender Firewall". This tool offers a wide range of features, including logging both blocked and successful connections. Surprisingly, these logging options are disabled by default.
This guide will walk you through enabling firewall logging and understanding the log data it generates.



Name: Path where the log file is saved — default is C:\Windows\System32\LogFiles\Firewall\pfirewall.log
Size limit (KB): Default is 4096KB (4MB)
Log dropped packets: Set to Yes
Log successful connections: We recommend leaving this set to No to avoid excessive noise in logs Click OK to save the settings.

The log file structure is straightforward. Each entry contains several fields such as:
Example log entries:
2022‑10‑21 12:04:12 DROP TCP 123.123.123.123 111.222.333.444 63573 3389 52 S 2140869953 0 8192 - - - RECEIVE 4 2022‑10‑21 12:04:49 ALLOW UDP 111.222.333.444 239.255.255.250 61929 1900 0 - - - - - - - SEND 932
The first entry shows a blocked (DROP) attempt to connect to Remote Desktop port 3389 from IP 123.123.123.123.
The second entry shows a successful outgoing (ALLOW) UDP broadcast to IP 239.255.255.250 — this is usually harmless.
Details like size, TCP flags, and ICMP fields can usually be ignored for standard security reviews.
Focus on action, protocol, src-ip, dst-ip, dst-port, path, and pid for useful insights.
By enabling firewall logging and reviewing key fields, you gain valuable visibility into unwanted or suspicious connections on your VPS.
Contact our experts, they will be happy to help!
Contact us