{"id":4675,"date":"2012-11-13T11:59:00","date_gmt":"2012-11-13T11:59:00","guid":{"rendered":"https:\/\/blogs.technet.microsoft.com\/heyscriptingguy\/2012\/11\/13\/powertip-use-powershell-to-find-domain-enabled-firewall-rules\/"},"modified":"2012-11-13T11:59:00","modified_gmt":"2012-11-13T11:59:00","slug":"powertip-use-powershell-to-find-domain-enabled-firewall-rules","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/scripting\/powertip-use-powershell-to-find-domain-enabled-firewall-rules\/","title":{"rendered":"PowerTip: Use PowerShell to Find Domain-Enabled Firewall Rules"},"content":{"rendered":"<p><strong>Summary:<\/strong>&nbsp;Learn how to identify domain firewall rules by using Windows PowerShell&nbsp;3.0 on Windows&nbsp;8 or Windows Server&nbsp;2012.<\/p>\n<p><strong><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/q-for-powertip.jpg\" alt=\"Hey, Scripting Guy! Question\" \/>&nbsp;<\/strong>How can I find specific Domain profile firewall rules on my computer running Windows&nbsp;8 or Windows Server&nbsp;2012?<\/p>\n<p style=\"padding-left: 60px\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/a-for-powertip.jpg\" alt=\"Hey, Scripting Guy! Answer\" \/>&nbsp;Use the&nbsp;<strong>Get-NetFirewallRule<\/strong>&nbsp;cmdlet and specify the&nbsp;<strong>enabled<\/strong><em>&nbsp;<\/em>parameter as&nbsp;<strong>true<\/strong>&nbsp;and filter on the domain profile, as shown here.<\/p>\n<p style=\"padding-left: 120px\">Get-NetFirewallRule -Enabled true | Where profile -eq &#8216;Domain&#8217;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/7610.Dr.ScriptoForTips.jpg\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/7610.Dr.ScriptoForTips.jpg\" alt=\"\" border=\"0\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary:&nbsp;Learn how to identify domain firewall rules by using Windows PowerShell&nbsp;3.0 on Windows&nbsp;8 or Windows Server&nbsp;2012. &nbsp;How can I find specific Domain profile firewall rules on my computer running Windows&nbsp;8 or Windows Server&nbsp;2012? &nbsp;Use the&nbsp;Get-NetFirewallRule&nbsp;cmdlet and specify the&nbsp;enabled&nbsp;parameter as&nbsp;true&nbsp;and filter on the domain profile, as shown here. Get-NetFirewallRule -Enabled true | Where profile -eq &#8216;Domain&#8217; [&hellip;]<\/p>\n","protected":false},"author":596,"featured_media":87096,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[161,356,3,63,367,45],"class_list":["post-4675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scripting","tag-firewall","tag-powertip","tag-scripting-guy","tag-security","tag-windows-8","tag-windows-powershell"],"acf":[],"blog_post_summary":"<p>Summary:&nbsp;Learn how to identify domain firewall rules by using Windows PowerShell&nbsp;3.0 on Windows&nbsp;8 or Windows Server&nbsp;2012. &nbsp;How can I find specific Domain profile firewall rules on my computer running Windows&nbsp;8 or Windows Server&nbsp;2012? &nbsp;Use the&nbsp;Get-NetFirewallRule&nbsp;cmdlet and specify the&nbsp;enabled&nbsp;parameter as&nbsp;true&nbsp;and filter on the domain profile, as shown here. Get-NetFirewallRule -Enabled true | Where profile -eq &#8216;Domain&#8217; [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/posts\/4675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/users\/596"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/comments?post=4675"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/posts\/4675\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/media\/87096"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/media?parent=4675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/categories?post=4675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/tags?post=4675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}