CIM_PolicySet, ROOT\StandardCimv2 - Instances

Class | Childs (1) | Methods | Properties (9) | Qualifiers (5) | Instances (40) | Namespaces (2)
Samples: VB Script | C# | VB.Net | Search on:Microsoft

Instances of CIM_PolicySet

This section contains sample wmi instances of CIM_PolicySet class with their properties from Microsoft Windows Server 2012 R2 Datacenter Evaluation.
CIM_PolicySet is an abstract class, so it has only derived instances, see derived child classes.

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|vm-monitoring-icmpv6",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|vm-monitoring-icmpv6' //String
   'Description' : 'Echo Request messages are sent as ping requests to other nodes.' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Virtual Machine Monitoring' //String
   'DisplayName' : 'Virtual Machine Monitoring (Echo Request - ICMPv6-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@vmicres.dll,-703' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'vm-monitoring-icmpv6' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@vmicres.dll,-700' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|vm-monitoring-rpc",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|vm-monitoring-rpc' //String
   'Description' : 'Allow Task Scheduler service to be remotely managed via RPC/TCP.' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Virtual Machine Monitoring' //String
   'DisplayName' : 'Virtual Machine Monitoring (RPC)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@vmicres.dll,-707' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'vm-monitoring-rpc' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@vmicres.dll,-700' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|vm-monitoring-icmpv4",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|vm-monitoring-icmpv4' //String
   'Description' : 'Echo Request messages are sent as ping requests to other nodes.' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Virtual Machine Monitoring' //String
   'DisplayName' : 'Virtual Machine Monitoring (Echo Request - ICMPv4-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@vmicres.dll,-701' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'vm-monitoring-icmpv4' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@vmicres.dll,-700' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|vm-monitoring-dcom",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|vm-monitoring-dcom' //String
   'Description' : 'Allow DCOM traffic for remote Windows Management Instrumentation.' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Virtual Machine Monitoring' //String
   'DisplayName' : 'Virtual Machine Monitoring (DCOM-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@vmicres.dll,-709' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'vm-monitoring-dcom' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@vmicres.dll,-700' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|vm-monitoring-nb-session",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|vm-monitoring-nb-session' //String
   'Description' : 'Allow NetBIOS Session Service connections.' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Virtual Machine Monitoring' //String
   'DisplayName' : 'Virtual Machine Monitoring (NB-Session-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@vmicres.dll,-705' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'vm-monitoring-nb-session' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@vmicres.dll,-700' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|SNMPTRAP-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|SNMPTRAP-In-UDP' //String
   'Description' : 'Inbound rule for the SNMP Trap Service to allow SNMP traps. [UDP 162]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'SNMP Trap' //String
   'DisplayName' : 'SNMP Trap Service (UDP In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@snmptrap.exe,-7' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'SNMPTRAP-In-UDP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 6 //Long, 0x6
   'RuleGroup' : '@snmptrap.exe,-3' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|SNMPTRAP-In-UDP-NoScope",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|SNMPTRAP-In-UDP-NoScope' //String
   'Description' : 'Inbound rule for the SNMP Trap Service to allow SNMP traps. [UDP 162]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'SNMP Trap' //String
   'DisplayName' : 'SNMP Trap Service (UDP In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@snmptrap.exe,-7' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'SNMPTRAP-In-UDP-NoScope' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 1 //Long, 0x1
   'RuleGroup' : '@snmptrap.exe,-3' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|Wininit-Shutdown-In-Rule-TCP-RPC",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|Wininit-Shutdown-In-Rule-TCP-RPC' //String
   'Description' : 'Inbound rule for the Remote Shutdown via dynamic RPC/TCP.' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Remote Shutdown' //String
   'DisplayName' : 'Inbound Rule for Remote Shutdown (TCP-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@firewallapi.dll,-36753' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'Wininit-Shutdown-In-Rule-TCP-RPC' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@firewallapi.dll,-36751' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|Wininit-Shutdown-In-Rule-TCP-RPC-EPMapper",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|Wininit-Shutdown-In-Rule-TCP-RPC-EPMapper' //String
   'Description' : 'Inbound rule for the RPCSS service to allow RPC/TCP traffic' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Remote Shutdown' //String
   'DisplayName' : 'Inbound Rule for Remote Shutdown (RPC-EP-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@firewallapi.dll,-36755' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'Wininit-Shutdown-In-Rule-TCP-RPC-EPMapper' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@firewallapi.dll,-36751' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|EventForwarder-In-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|EventForwarder-In-TCP' //String
   'Description' : 'Inbound rule for remote event monitoring via RPC/TCP.' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Remote Event Monitor' //String
   'DisplayName' : 'Remote Event Monitor (RPC)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-36802' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'EventForwarder-In-TCP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@FirewallAPI.dll,-36801' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|EventForwarder-RPCSS-In-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|EventForwarder-RPCSS-In-TCP' //String
   'Description' : 'Inbound rule for the RPCSS service to allow RPC/TCP traffic for remote event monitoring.' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Remote Event Monitor' //String
   'DisplayName' : 'Remote Event Monitor (RPC-EPMAP)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-36804' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'EventForwarder-RPCSS-In-TCP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@FirewallAPI.dll,-36801' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-UPnPHost-In-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-UPnPHost-In-TCP' //String
   'Description' : 'Inbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP 2869]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (UPnP-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32761' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-UPnPHost-In-TCP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-UPnPHost-Out-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-UPnPHost-Out-TCP' //String
   'Description' : 'Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP]' //String
   'Direction' : 2 //Long, 0x2
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (UPnP-Out)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32765' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-UPnPHost-Out-TCP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-NB_Name-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-NB_Name-In-UDP' //String
   'Description' : 'Inbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (NB-Name-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32769' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-NB_Name-In-UDP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-NB_Name-Out-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-NB_Name-Out-UDP' //String
   'Description' : 'Outbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137]' //String
   'Direction' : 2 //Long, 0x2
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (NB-Name-Out)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32773' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-NB_Name-Out-UDP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-NB_Datagram-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-NB_Datagram-In-UDP' //String
   'Description' : 'Inbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (NB-Datagram-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32777' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-NB_Datagram-In-UDP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-NB_Datagram-Out-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-NB_Datagram-Out-UDP' //String
   'Description' : 'Outbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138]' //String
   'Direction' : 2 //Long, 0x2
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (NB-Datagram-Out)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32781' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-NB_Datagram-Out-UDP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-WSDEVNTS-In-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-WSDEVNTS-In-TCP' //String
   'Description' : 'Inbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (WSD EventsSecure-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32813' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-WSDEVNTS-In-TCP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-WSDEVNTS-Out-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-WSDEVNTS-Out-TCP' //String
   'Description' : 'Outbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358]' //String
   'Direction' : 2 //Long, 0x2
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (WSD EventsSecure-Out)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32815' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-WSDEVNTS-Out-TCP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-WSDEVNT-In-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-WSDEVNT-In-TCP' //String
   'Description' : 'Inbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (WSD Events-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32817' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-WSDEVNT-In-TCP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-WSDEVNT-Out-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-WSDEVNT-Out-TCP' //String
   'Description' : 'Outbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357]' //String
   'Direction' : 2 //Long, 0x2
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (WSD Events-Out)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32819' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-WSDEVNT-Out-TCP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-SSDPSrv-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-SSDPSrv-In-UDP' //String
   'Description' : 'Inbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (SSDP-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32753' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-SSDPSrv-In-UDP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-SSDPSrv-Out-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-SSDPSrv-Out-UDP' //String
   'Description' : 'Outbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900]' //String
   'Direction' : 2 //Long, 0x2
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (SSDP-Out)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32757' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-SSDPSrv-Out-UDP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-UPnP-Out-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-UPnP-Out-TCP' //String
   'Description' : 'Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP]' //String
   'Direction' : 2 //Long, 0x2
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (UPnPHost-Out)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32821' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-UPnP-Out-TCP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-FDPHOST-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-FDPHOST-In-UDP' //String
   'Description' : 'Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (WSD-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32785' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-FDPHOST-In-UDP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-FDPHOST-Out-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-FDPHOST-Out-UDP' //String
   'Description' : 'Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]' //String
   'Direction' : 2 //Long, 0x2
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (WSD-Out)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32789' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-FDPHOST-Out-UDP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-LLMNR-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-LLMNR-In-UDP' //String
   'Description' : 'Inbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (LLMNR-UDP-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32801' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-LLMNR-In-UDP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-LLMNR-Out-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-LLMNR-Out-UDP' //String
   'Description' : 'Outbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355]' //String
   'Direction' : 2 //Long, 0x2
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (LLMNR-UDP-Out)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32805' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-LLMNR-Out-UDP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-FDRESPUB-WSD-In-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-FDRESPUB-WSD-In-UDP' //String
   'Description' : 'Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (Pub-WSD-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32809' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-FDRESPUB-WSD-In-UDP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|NETDIS-FDRESPUB-WSD-Out-UDP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|NETDIS-FDRESPUB-WSD-Out-UDP' //String
   'Description' : 'Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]' //String
   'Direction' : 2 //Long, 0x2
   'DisplayGroup' : 'Network Discovery' //String
   'DisplayName' : 'Network Discovery (Pub WSD-Out)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-32811' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'NETDIS-FDRESPUB-WSD-Out-UDP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 5 //Long, 0x5
   'RuleGroup' : '@FirewallAPI.dll,-32752' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|Netlogon-NamedPipe-In",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|Netlogon-NamedPipe-In' //String
   'Description' : 'Inbound rule for the NetLogon service to be remotely managed over Named Pipes.' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Netlogon Service' //String
   'DisplayName' : 'Netlogon Service (NP-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@netlogon.dll,-1003' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'Netlogon-NamedPipe-In' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@netlogon.dll,-1010' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|Netlogon-TCP-RPC-In",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|Netlogon-TCP-RPC-In' //String
   'Description' : 'Inbound rule for the NetLogon service to process remote authz requests via RPC/TCP.' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Netlogon Service' //String
   'DisplayName' : 'Netlogon Service Authz (RPC)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@netlogon.dll,-1008' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'Netlogon-TCP-RPC-In' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@netlogon.dll,-1010' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|SCW-Allow-Inbound-Access-To-ScsHost-TCP-RPC",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|SCW-Allow-Inbound-Access-To-ScsHost-TCP-RPC' //String
   'Description' : 'Allow inbound access for scshost using dynamic RPC and protocol TCP' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Windows Security Configuration Wizard' //String
   'DisplayName' : 'SCW remote access firewall rule - Scshost - Dynamic RPC' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@scwcmd.exe,-8001' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'SCW-Allow-Inbound-Access-To-ScsHost-TCP-RPC' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@scwcmd.exe,-8000' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|SCW-Allow-Inbound-Access-To-ScsHost-TCP-RPC-EndPointMapper",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|SCW-Allow-Inbound-Access-To-ScsHost-TCP-RPC-EndPointMapper' //String
   'Description' : 'Allow inbound access for scshost using end point RPC mapper and protocol TCP' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Windows Security Configuration Wizard' //String
   'DisplayName' : 'SCW remote access firewall rule - Scshost - End Point RPC Mapper' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@scwcmd.exe,-8003' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'SCW-Allow-Inbound-Access-To-ScsHost-TCP-RPC-EndPointMapper' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@scwcmd.exe,-8000' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|SCW-Allow-Inbound-Access-To-Rpcss-TCP-Port135",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|SCW-Allow-Inbound-Access-To-Rpcss-TCP-Port135' //String
   'Description' : 'Allow inbound access for svchost using port 135 and protocol TCP' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Windows Security Configuration Wizard' //String
   'DisplayName' : 'SCW remote access firewall rule - Svchost - TCP' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@scwcmd.exe,-8005' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'SCW-Allow-Inbound-Access-To-Rpcss-TCP-Port135' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@scwcmd.exe,-8000' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|SSTP-IN-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|SSTP-IN-TCP' //String
   'Description' : 'Inbound rule to allow HTTPS traffic for Secure Socket Tunneling Protocol. [TCP 443]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Secure Socket Tunneling Protocol' //String
   'DisplayName' : 'Secure Socket Tunneling Protocol (SSTP-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@sstpsvc.dll,-35002' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'SSTP-IN-TCP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@sstpsvc.dll,-35001' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|RemoteTask-In-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|RemoteTask-In-TCP' //String
   'Description' : 'Inbound rule for the Task Scheduler service to be remotely managed via RPC/TCP.' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Remote Scheduled Tasks Management' //String
   'DisplayName' : 'Remote Scheduled Tasks Management (RPC)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-33253' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'RemoteTask-In-TCP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@FirewallAPI.dll,-33252' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|RemoteTask-RPCSS-In-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|RemoteTask-RPCSS-In-TCP' //String
   'Description' : 'Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Task Scheduler service.' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Remote Scheduled Tasks Management' //String
   'DisplayName' : 'Remote Scheduled Tasks Management (RPC-EPMAP)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-33257' //String
   'Enabled' : 2 //Long, 0x2
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'RemoteTask-RPCSS-In-TCP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 0 //Long, 0x0
   'RuleGroup' : '@FirewallAPI.dll,-33252' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|WINRM-HTTP-In-TCP",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|WINRM-HTTP-In-TCP' //String
   'Description' : 'Inbound rule for Windows Remote Management via WS-Management. [TCP 5985]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Windows Remote Management' //String
   'DisplayName' : 'Windows Remote Management (HTTP-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-30253' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'WINRM-HTTP-In-TCP' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 3 //Long, 0x3
   'RuleGroup' : '@FirewallAPI.dll,-30267' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}

Instance \\W2012SDC\ROOT\StandardCimv2:MSFT_NetFirewallRule.CreationClassName="MSFT|FW|FirewallRule|WINRM-HTTP-In-TCP-PUBLIC",PolicyRuleName="",SystemCreationClassName="",SystemName=""

Properties={
   'Action' : 2 //Long, 0x2
   'Caption' : null
   'CommonName' : null
   'ConditionListType' : 3 //Long, 0x3
   'CreationClassName' : 'MSFT|FW|FirewallRule|WINRM-HTTP-In-TCP-PUBLIC' //String
   'Description' : 'Inbound rule for Windows Remote Management via WS-Management. [TCP 5985]' //String
   'Direction' : 1 //Long, 0x1
   'DisplayGroup' : 'Windows Remote Management' //String
   'DisplayName' : 'Windows Remote Management (HTTP-In)' //String
   'EdgeTraversalPolicy' : 0 //Long, 0x0
   'ElementName' : '@FirewallAPI.dll,-30253' //String
   'Enabled' : 1 //Long, 0x1
   'EnforcementStatus' : [0] //Variant()
   'ExecutionStrategy' : 2 //Long, 0x2
   'InstanceID' : 'WINRM-HTTP-In-TCP-PUBLIC' //String
   'LocalOnlyMapping' : False //Boolean, 0x0
   'LooseSourceMapping' : False //Boolean, 0x0
   'Mandatory' : null
   'Owner' : null
   'Platforms' : [] //Variant()
   'PolicyDecisionStrategy' : 2 //Long, 0x2
   'PolicyKeywords' : null
   'PolicyRoles' : null
   'PolicyRuleName' : '' //String
   'PolicyStoreSource' : 'PersistentStore' //String
   'PolicyStoreSourceType' : 1 //Long, 0x1
   'PrimaryStatus' : 1 //Long, 0x1
   'Priority' : null
   'Profiles' : 4 //Long, 0x4
   'RuleGroup' : '@FirewallAPI.dll,-30267' //String
   'RuleUsage' : null
   'SequencedActions' : 3 //Long, 0x3
   'Status' : 'The rule was parsed successfully from the store.' //String
   'StatusCode' : 65536 //Long, 0x10000
   'SystemCreationClassName' : '' //String
   'SystemName' : '' //String
}
WUtils.com
online utility - toplist