Includes&Samples |
CIM_Policy, ROOT\StandardCimv2 - InstancesClass | Childs (2) | Methods | Properties (6) | Qualifiers (5) | Instances (40) | Namespaces (2)Samples: VB Script | C# | VB.Net | Search on:Microsoft Instances of CIM_PolicyThis section contains sample wmi instances of CIM_Policy class with their properties from Microsoft Windows Server 2012 R2 Datacenter Evaluation. CIM_Policy is an abstract class, so it has only derived instances, see derived child classes. Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetUDPSetting.CreationClassName="",PolicyActionName="",PolicyRuleCreationClassName="",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Caption' : null 'CommonName' : null 'CreationClassName' : '' //String 'Description' : null 'DoActionLogging' : null 'DynamicPortRangeNumberOfPorts' : 16384 //Long, 0x4000 'DynamicPortRangeStartPort' : 49152 //Long, 0xC000 'ElementName' : null 'InstanceID' : null 'PolicyActionName' : '' //String 'PolicyKeywords' : null 'PolicyRuleCreationClassName' : '' //String 'PolicyRuleName' : '' //String 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetTCPSetting.CreationClassName="",PolicyActionName="",PolicyRuleCreationClassName="",PolicyRuleName="Automatic",SystemCreationClassName="",SystemName=""Properties={ 'AutomaticUseCustom' : null 'AutoTuningLevelEffective' : null 'AutoTuningLevelGroupPolicy' : null 'AutoTuningLevelLocal' : null 'Caption' : null 'CommonName' : null 'CongestionProvider' : null 'CreationClassName' : '' //String 'CwndRestart' : null 'DelayedAckFrequency' : null 'DelayedAckTimeout' : null 'Description' : null 'DoActionLogging' : null 'DynamicPortRangeNumberOfPorts' : null 'DynamicPortRangeStartPort' : null 'EcnCapability' : null 'ElementName' : null 'ForceWS' : null 'InitialCongestionWindow' : null 'InitialRto' : null 'InstanceID' : null 'MaxSynRetransmissions' : null 'MemoryPressureProtection' : null 'MinRto' : null 'NonSackRttResiliency' : null 'PolicyActionName' : '' //String 'PolicyKeywords' : null 'PolicyRuleCreationClassName' : '' //String 'PolicyRuleName' : 'Automatic' //String 'ScalingHeuristics' : null 'SettingName' : 'Automatic' //String 'SystemCreationClassName' : '' //String 'SystemName' : '' //String 'Timestamps' : null } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetTCPSetting.CreationClassName="",PolicyActionName="",PolicyRuleCreationClassName="",PolicyRuleName="InternetCustom",SystemCreationClassName="",SystemName=""Properties={ 'AutomaticUseCustom' : 0 //Byte, 0x0 'AutoTuningLevelEffective' : 0 //Byte, 0x0 'AutoTuningLevelGroupPolicy' : 254 //Byte, 0xFE 'AutoTuningLevelLocal' : 3 //Byte, 0x3 'Caption' : null 'CommonName' : null 'CongestionProvider' : 2 //Byte, 0x2 'CreationClassName' : '' //String 'CwndRestart' : 0 //Byte, 0x0 'DelayedAckFrequency' : 2 //Byte, 0x2 'DelayedAckTimeout' : 50 //Long, 0x32 'Description' : null 'DoActionLogging' : null 'DynamicPortRangeNumberOfPorts' : 16348 //Long, 0x3FDC 'DynamicPortRangeStartPort' : 49152 //Long, 0xC000 'EcnCapability' : 1 //Byte, 0x1 'ElementName' : null 'ForceWS' : 0 //Byte, 0x0 'InitialCongestionWindow' : 4 //Long, 0x4 'InitialRto' : 3000 //Long, 0xBB8 'InstanceID' : null 'MaxSynRetransmissions' : 2 //Byte, 0x2 'MemoryPressureProtection' : 1 //Byte, 0x1 'MinRto' : 300 //Long, 0x12C 'NonSackRttResiliency' : 0 //Byte, 0x0 'PolicyActionName' : '' //String 'PolicyKeywords' : null 'PolicyRuleCreationClassName' : '' //String 'PolicyRuleName' : 'InternetCustom' //String 'ScalingHeuristics' : 0 //Byte, 0x0 'SettingName' : 'InternetCustom' //String 'SystemCreationClassName' : '' //String 'SystemName' : '' //String 'Timestamps' : 0 //Byte, 0x0 } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetTCPSetting.CreationClassName="",PolicyActionName="",PolicyRuleCreationClassName="",PolicyRuleName="DatacenterCustom",SystemCreationClassName="",SystemName=""Properties={ 'AutomaticUseCustom' : 0 //Byte, 0x0 'AutoTuningLevelEffective' : 0 //Byte, 0x0 'AutoTuningLevelGroupPolicy' : 254 //Byte, 0xFE 'AutoTuningLevelLocal' : 3 //Byte, 0x3 'Caption' : null 'CommonName' : null 'CongestionProvider' : 3 //Byte, 0x3 'CreationClassName' : '' //String 'CwndRestart' : 1 //Byte, 0x1 'DelayedAckFrequency' : 2 //Byte, 0x2 'DelayedAckTimeout' : 10 //Long, 0xA 'Description' : null 'DoActionLogging' : null 'DynamicPortRangeNumberOfPorts' : 16348 //Long, 0x3FDC 'DynamicPortRangeStartPort' : 49152 //Long, 0xC000 'EcnCapability' : 1 //Byte, 0x1 'ElementName' : null 'ForceWS' : 0 //Byte, 0x0 'InitialCongestionWindow' : 4 //Long, 0x4 'InitialRto' : 3000 //Long, 0xBB8 'InstanceID' : null 'MaxSynRetransmissions' : 2 //Byte, 0x2 'MemoryPressureProtection' : 1 //Byte, 0x1 'MinRto' : 20 //Long, 0x14 'NonSackRttResiliency' : 0 //Byte, 0x0 'PolicyActionName' : '' //String 'PolicyKeywords' : null 'PolicyRuleCreationClassName' : '' //String 'PolicyRuleName' : 'DatacenterCustom' //String 'ScalingHeuristics' : 0 //Byte, 0x0 'SettingName' : 'DatacenterCustom' //String 'SystemCreationClassName' : '' //String 'SystemName' : '' //String 'Timestamps' : 0 //Byte, 0x0 } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetTCPSetting.CreationClassName="",PolicyActionName="",PolicyRuleCreationClassName="",PolicyRuleName="Compat",SystemCreationClassName="",SystemName=""Properties={ 'AutomaticUseCustom' : 0 //Byte, 0x0 'AutoTuningLevelEffective' : 0 //Byte, 0x0 'AutoTuningLevelGroupPolicy' : 254 //Byte, 0xFE 'AutoTuningLevelLocal' : 3 //Byte, 0x3 'Caption' : null 'CommonName' : null 'CongestionProvider' : 0 //Byte, 0x0 'CreationClassName' : '' //String 'CwndRestart' : 0 //Byte, 0x0 'DelayedAckFrequency' : 2 //Byte, 0x2 'DelayedAckTimeout' : 200 //Long, 0xC8 'Description' : null 'DoActionLogging' : null 'DynamicPortRangeNumberOfPorts' : 16348 //Long, 0x3FDC 'DynamicPortRangeStartPort' : 49152 //Long, 0xC000 'EcnCapability' : 1 //Byte, 0x1 'ElementName' : null 'ForceWS' : 0 //Byte, 0x0 'InitialCongestionWindow' : 2 //Long, 0x2 'InitialRto' : 3000 //Long, 0xBB8 'InstanceID' : null 'MaxSynRetransmissions' : 2 //Byte, 0x2 'MemoryPressureProtection' : 1 //Byte, 0x1 'MinRto' : 300 //Long, 0x12C 'NonSackRttResiliency' : 0 //Byte, 0x0 'PolicyActionName' : '' //String 'PolicyKeywords' : null 'PolicyRuleCreationClassName' : '' //String 'PolicyRuleName' : 'Compat' //String 'ScalingHeuristics' : 0 //Byte, 0x0 'SettingName' : 'Compat' //String 'SystemCreationClassName' : '' //String 'SystemName' : '' //String 'Timestamps' : 0 //Byte, 0x0 } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetTCPSetting.CreationClassName="",PolicyActionName="",PolicyRuleCreationClassName="",PolicyRuleName="Datacenter",SystemCreationClassName="",SystemName=""Properties={ 'AutomaticUseCustom' : 0 //Byte, 0x0 'AutoTuningLevelEffective' : 0 //Byte, 0x0 'AutoTuningLevelGroupPolicy' : 254 //Byte, 0xFE 'AutoTuningLevelLocal' : 3 //Byte, 0x3 'Caption' : null 'CommonName' : null 'CongestionProvider' : 3 //Byte, 0x3 'CreationClassName' : '' //String 'CwndRestart' : 1 //Byte, 0x1 'DelayedAckFrequency' : 2 //Byte, 0x2 'DelayedAckTimeout' : 10 //Long, 0xA 'Description' : null 'DoActionLogging' : null 'DynamicPortRangeNumberOfPorts' : 16348 //Long, 0x3FDC 'DynamicPortRangeStartPort' : 49152 //Long, 0xC000 'EcnCapability' : 1 //Byte, 0x1 'ElementName' : null 'ForceWS' : 0 //Byte, 0x0 'InitialCongestionWindow' : 4 //Long, 0x4 'InitialRto' : 3000 //Long, 0xBB8 'InstanceID' : null 'MaxSynRetransmissions' : 2 //Byte, 0x2 'MemoryPressureProtection' : 1 //Byte, 0x1 'MinRto' : 20 //Long, 0x14 'NonSackRttResiliency' : 0 //Byte, 0x0 'PolicyActionName' : '' //String 'PolicyKeywords' : null 'PolicyRuleCreationClassName' : '' //String 'PolicyRuleName' : 'Datacenter' //String 'ScalingHeuristics' : 0 //Byte, 0x0 'SettingName' : 'Datacenter' //String 'SystemCreationClassName' : '' //String 'SystemName' : '' //String 'Timestamps' : 0 //Byte, 0x0 } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetTCPSetting.CreationClassName="",PolicyActionName="",PolicyRuleCreationClassName="",PolicyRuleName="Internet",SystemCreationClassName="",SystemName=""Properties={ 'AutomaticUseCustom' : 0 //Byte, 0x0 'AutoTuningLevelEffective' : 0 //Byte, 0x0 'AutoTuningLevelGroupPolicy' : 254 //Byte, 0xFE 'AutoTuningLevelLocal' : 3 //Byte, 0x3 'Caption' : null 'CommonName' : null 'CongestionProvider' : 2 //Byte, 0x2 'CreationClassName' : '' //String 'CwndRestart' : 0 //Byte, 0x0 'DelayedAckFrequency' : 2 //Byte, 0x2 'DelayedAckTimeout' : 50 //Long, 0x32 'Description' : null 'DoActionLogging' : null 'DynamicPortRangeNumberOfPorts' : 16348 //Long, 0x3FDC 'DynamicPortRangeStartPort' : 49152 //Long, 0xC000 'EcnCapability' : 1 //Byte, 0x1 'ElementName' : null 'ForceWS' : 0 //Byte, 0x0 'InitialCongestionWindow' : 4 //Long, 0x4 'InitialRto' : 3000 //Long, 0xBB8 'InstanceID' : null 'MaxSynRetransmissions' : 2 //Byte, 0x2 'MemoryPressureProtection' : 1 //Byte, 0x1 'MinRto' : 300 //Long, 0x12C 'NonSackRttResiliency' : 0 //Byte, 0x0 'PolicyActionName' : '' //String 'PolicyKeywords' : null 'PolicyRuleCreationClassName' : '' //String 'PolicyRuleName' : 'Internet' //String 'ScalingHeuristics' : 0 //Byte, 0x0 'SettingName' : 'Internet' //String 'SystemCreationClassName' : '' //String 'SystemName' : '' //String 'Timestamps' : 0 //Byte, 0x0 } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|vm-monitoring-icmpv6",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|vm-monitoring-icmpv6' //String 'Description' : 'Echo Request messages are sent as ping requests to other nodes.' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Virtual Machine Monitoring' //String 'DisplayName' : 'Virtual Machine Monitoring (Echo Request - ICMPv6-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@vmicres.dll,-703' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'vm-monitoring-icmpv6' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 0 //Long, 0x0 'RuleGroup' : '@vmicres.dll,-700' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|vm-monitoring-rpc",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|vm-monitoring-rpc' //String 'Description' : 'Allow Task Scheduler service to be remotely managed via RPC/TCP.' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Virtual Machine Monitoring' //String 'DisplayName' : 'Virtual Machine Monitoring (RPC)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@vmicres.dll,-707' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'vm-monitoring-rpc' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 0 //Long, 0x0 'RuleGroup' : '@vmicres.dll,-700' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|vm-monitoring-icmpv4",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|vm-monitoring-icmpv4' //String 'Description' : 'Echo Request messages are sent as ping requests to other nodes.' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Virtual Machine Monitoring' //String 'DisplayName' : 'Virtual Machine Monitoring (Echo Request - ICMPv4-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@vmicres.dll,-701' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'vm-monitoring-icmpv4' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 0 //Long, 0x0 'RuleGroup' : '@vmicres.dll,-700' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|vm-monitoring-dcom",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|vm-monitoring-dcom' //String 'Description' : 'Allow DCOM traffic for remote Windows Management Instrumentation.' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Virtual Machine Monitoring' //String 'DisplayName' : 'Virtual Machine Monitoring (DCOM-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@vmicres.dll,-709' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'vm-monitoring-dcom' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 0 //Long, 0x0 'RuleGroup' : '@vmicres.dll,-700' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|vm-monitoring-nb-session",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|vm-monitoring-nb-session' //String 'Description' : 'Allow NetBIOS Session Service connections.' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Virtual Machine Monitoring' //String 'DisplayName' : 'Virtual Machine Monitoring (NB-Session-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@vmicres.dll,-705' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'vm-monitoring-nb-session' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 0 //Long, 0x0 'RuleGroup' : '@vmicres.dll,-700' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|SNMPTRAP-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|SNMPTRAP-In-UDP' //String 'Description' : 'Inbound rule for the SNMP Trap Service to allow SNMP traps. [UDP 162]' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'SNMP Trap' //String 'DisplayName' : 'SNMP Trap Service (UDP In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@snmptrap.exe,-7' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'SNMPTRAP-In-UDP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 6 //Long, 0x6 'RuleGroup' : '@snmptrap.exe,-3' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|SNMPTRAP-In-UDP-NoScope",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|SNMPTRAP-In-UDP-NoScope' //String 'Description' : 'Inbound rule for the SNMP Trap Service to allow SNMP traps. [UDP 162]' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'SNMP Trap' //String 'DisplayName' : 'SNMP Trap Service (UDP In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@snmptrap.exe,-7' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'SNMPTRAP-In-UDP-NoScope' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 1 //Long, 0x1 'RuleGroup' : '@snmptrap.exe,-3' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|Wininit-Shutdown-In-Rule-TCP-RPC",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|Wininit-Shutdown-In-Rule-TCP-RPC' //String 'Description' : 'Inbound rule for the Remote Shutdown via dynamic RPC/TCP.' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Remote Shutdown' //String 'DisplayName' : 'Inbound Rule for Remote Shutdown (TCP-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@firewallapi.dll,-36753' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'Wininit-Shutdown-In-Rule-TCP-RPC' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 0 //Long, 0x0 'RuleGroup' : '@firewallapi.dll,-36751' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|Wininit-Shutdown-In-Rule-TCP-RPC-EPMapper",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|Wininit-Shutdown-In-Rule-TCP-RPC-EPMapper' //String 'Description' : 'Inbound rule for the RPCSS service to allow RPC/TCP traffic' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Remote Shutdown' //String 'DisplayName' : 'Inbound Rule for Remote Shutdown (RPC-EP-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@firewallapi.dll,-36755' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'Wininit-Shutdown-In-Rule-TCP-RPC-EPMapper' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 0 //Long, 0x0 'RuleGroup' : '@firewallapi.dll,-36751' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|EventForwarder-In-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|EventForwarder-In-TCP' //String 'Description' : 'Inbound rule for remote event monitoring via RPC/TCP.' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Remote Event Monitor' //String 'DisplayName' : 'Remote Event Monitor (RPC)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-36802' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'EventForwarder-In-TCP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 0 //Long, 0x0 'RuleGroup' : '@FirewallAPI.dll,-36801' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|EventForwarder-RPCSS-In-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|EventForwarder-RPCSS-In-TCP' //String 'Description' : 'Inbound rule for the RPCSS service to allow RPC/TCP traffic for remote event monitoring.' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Remote Event Monitor' //String 'DisplayName' : 'Remote Event Monitor (RPC-EPMAP)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-36804' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'EventForwarder-RPCSS-In-TCP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 0 //Long, 0x0 'RuleGroup' : '@FirewallAPI.dll,-36801' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-UPnPHost-In-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-UPnPHost-In-TCP' //String 'Description' : 'Inbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP 2869]' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (UPnP-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32761' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-UPnPHost-In-TCP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-UPnPHost-Out-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-UPnPHost-Out-TCP' //String 'Description' : 'Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP]' //String 'Direction' : 2 //Long, 0x2 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (UPnP-Out)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32765' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-UPnPHost-Out-TCP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-NB_Name-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-NB_Name-In-UDP' //String 'Description' : 'Inbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137]' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (NB-Name-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32769' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-NB_Name-In-UDP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-NB_Name-Out-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-NB_Name-Out-UDP' //String 'Description' : 'Outbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137]' //String 'Direction' : 2 //Long, 0x2 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (NB-Name-Out)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32773' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-NB_Name-Out-UDP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-NB_Datagram-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-NB_Datagram-In-UDP' //String 'Description' : 'Inbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138]' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (NB-Datagram-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32777' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-NB_Datagram-In-UDP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-NB_Datagram-Out-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-NB_Datagram-Out-UDP' //String 'Description' : 'Outbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138]' //String 'Direction' : 2 //Long, 0x2 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (NB-Datagram-Out)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32781' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-NB_Datagram-Out-UDP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-WSDEVNTS-In-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-WSDEVNTS-In-TCP' //String 'Description' : 'Inbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358]' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (WSD EventsSecure-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32813' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-WSDEVNTS-In-TCP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-WSDEVNTS-Out-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-WSDEVNTS-Out-TCP' //String 'Description' : 'Outbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358]' //String 'Direction' : 2 //Long, 0x2 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (WSD EventsSecure-Out)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32815' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-WSDEVNTS-Out-TCP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-WSDEVNT-In-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-WSDEVNT-In-TCP' //String 'Description' : 'Inbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357]' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (WSD Events-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32817' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-WSDEVNT-In-TCP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-WSDEVNT-Out-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-WSDEVNT-Out-TCP' //String 'Description' : 'Outbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357]' //String 'Direction' : 2 //Long, 0x2 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (WSD Events-Out)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32819' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-WSDEVNT-Out-TCP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-SSDPSrv-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-SSDPSrv-In-UDP' //String 'Description' : 'Inbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900]' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (SSDP-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32753' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-SSDPSrv-In-UDP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-SSDPSrv-Out-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-SSDPSrv-Out-UDP' //String 'Description' : 'Outbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900]' //String 'Direction' : 2 //Long, 0x2 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (SSDP-Out)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32757' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-SSDPSrv-Out-UDP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-UPnP-Out-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-UPnP-Out-TCP' //String 'Description' : 'Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP]' //String 'Direction' : 2 //Long, 0x2 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (UPnPHost-Out)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32821' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-UPnP-Out-TCP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-FDPHOST-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-FDPHOST-In-UDP' //String 'Description' : 'Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (WSD-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32785' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-FDPHOST-In-UDP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-FDPHOST-Out-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-FDPHOST-Out-UDP' //String 'Description' : 'Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]' //String 'Direction' : 2 //Long, 0x2 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (WSD-Out)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32789' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-FDPHOST-Out-UDP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-LLMNR-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-LLMNR-In-UDP' //String 'Description' : 'Inbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355]' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (LLMNR-UDP-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32801' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-LLMNR-In-UDP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-LLMNR-Out-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-LLMNR-Out-UDP' //String 'Description' : 'Outbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355]' //String 'Direction' : 2 //Long, 0x2 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (LLMNR-UDP-Out)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32805' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-LLMNR-Out-UDP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-FDRESPUB-WSD-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-FDRESPUB-WSD-In-UDP' //String 'Description' : 'Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (Pub-WSD-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32809' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-FDRESPUB-WSD-In-UDP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-FDRESPUB-WSD-Out-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-FDRESPUB-WSD-Out-UDP' //String 'Description' : 'Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]' //String 'Direction' : 2 //Long, 0x2 'DisplayGroup' : 'Network Discovery' //String 'DisplayName' : 'Network Discovery (Pub WSD-Out)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@FirewallAPI.dll,-32811' //String 'Enabled' : 1 //Long, 0x1 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'NETDIS-FDRESPUB-WSD-Out-UDP' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 5 //Long, 0x5 'RuleGroup' : '@FirewallAPI.dll,-32752' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|Netlogon-NamedPipe-In",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|Netlogon-NamedPipe-In' //String 'Description' : 'Inbound rule for the NetLogon service to be remotely managed over Named Pipes.' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Netlogon Service' //String 'DisplayName' : 'Netlogon Service (NP-In)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@netlogon.dll,-1003' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'Netlogon-NamedPipe-In' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 0 //Long, 0x0 'RuleGroup' : '@netlogon.dll,-1010' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|Netlogon-TCP-RPC-In",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|Netlogon-TCP-RPC-In' //String 'Description' : 'Inbound rule for the NetLogon service to process remote authz requests via RPC/TCP.' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Netlogon Service' //String 'DisplayName' : 'Netlogon Service Authz (RPC)' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@netlogon.dll,-1008' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'Netlogon-TCP-RPC-In' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 0 //Long, 0x0 'RuleGroup' : '@netlogon.dll,-1010' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|SCW-Allow-Inbound-Access-To-ScsHost-TCP-RPC",PolicyRuleName="",SystemCreationClassName="",SystemName=""Properties={ 'Action' : 2 //Long, 0x2 'Caption' : null 'CommonName' : null 'ConditionListType' : 3 //Long, 0x3 'CreationClassName' : 'MSFT|FW|FirewallRule|SCW-Allow-Inbound-Access-To-ScsHost-TCP-RPC' //String 'Description' : 'Allow inbound access for scshost using dynamic RPC and protocol TCP' //String 'Direction' : 1 //Long, 0x1 'DisplayGroup' : 'Windows Security Configuration Wizard' //String 'DisplayName' : 'SCW remote access firewall rule - Scshost - Dynamic RPC' //String 'EdgeTraversalPolicy' : 0 //Long, 0x0 'ElementName' : '@scwcmd.exe,-8001' //String 'Enabled' : 2 //Long, 0x2 'EnforcementStatus' : [0] //Variant() 'ExecutionStrategy' : 2 //Long, 0x2 'InstanceID' : 'SCW-Allow-Inbound-Access-To-ScsHost-TCP-RPC' //String 'LocalOnlyMapping' : False //Boolean, 0x0 'LooseSourceMapping' : False //Boolean, 0x0 'Mandatory' : null 'Owner' : null 'Platforms' : [] //Variant() 'PolicyDecisionStrategy' : 2 //Long, 0x2 'PolicyKeywords' : null 'PolicyRoles' : null 'PolicyRuleName' : '' //String 'PolicyStoreSource' : 'PersistentStore' //String 'PolicyStoreSourceType' : 1 //Long, 0x1 'PrimaryStatus' : 1 //Long, 0x1 'Priority' : null 'Profiles' : 0 //Long, 0x0 'RuleGroup' : '@scwcmd.exe,-8000' //String 'RuleUsage' : null 'SequencedActions' : 3 //Long, 0x3 'Status' : 'The rule was parsed successfully from the store.' //String 'StatusCode' : 65536 //Long, 0x10000 'SystemCreationClassName' : '' //String 'SystemName' : '' //String } |