Application Log

The application log stores information on all attempts of applications installed on your computer to connect to a network.

Firewall log file

For details on a certain option, click the corresponding item in the picture.
To get information on options available on other pages, click the corresponding item in the picture.

 

Column

Description

Time

The date and time of the connection attempt.

Application

The full path to the application executable file, its name and process identification number (PID).

Rule name

The name of the rule applied.

Direction

The direction of the connection:

Inbound – the rule is applied when someone from the network attempts to connect to an application on your computer.

Outbound – the rule is applied when an application on your computer attempts to connect to the network.

Any – apply the rule regardless of packet transfer direction.

Action

The action Firewall performed when the connection attempt was detected:

Block packets – the connection is blocked

Allow packets – the connection is allowed

Endpoint

The protocol, IP address, and the port used for the connection.

On this page, you can save the information to a file or clear the log.

 

To save log

Click Save, then enter the file name where to store the log.

 

To clear log

To delete all information from the log, click Clear.