Skip to main content

Show localports opening in Advfirewall using netsh

Old command to show ports opening in netsh is:
netsh firewall show portopening

For Windows OSes which uses Advance Firewall the above command may not work anymore.

PowerShell of course can get the list of ports used by Windows advance firewall with security.

The link below shows on how to use PowerShell to query advance firewall:

If a program or application utilizes a specific port and is not open or not being set on the firewall then the particular program or application may not be accessible remotely.

If command line is preferable, netsh is able to get or list the ports used by the firewall.

netsh advfirewall firewall show rule name=all  verbose | findstr "LocalPort:"

Sample output for the command above:

LocalPort:                            3540
LocalPort:                            Any
LocalPort:                            1900
LocalPort:                            Any
LocalPort:                            RPC
LocalPort:                            445
LocalPort:                            RPC-EPMap
LocalPort:                            RPC
LocalPort:                            445
LocalPort:                            RPC-EPMap
LocalPort:                            RPC
LocalPort:                            RPC-EPMap
LocalPort:                            RPC
LocalPort:                            RPC-EPMap
LocalPort:                            5985
LocalPort:                            5985
LocalPort:                            80
LocalPort:                            80
LocalPort:                            RPC
LocalPort:                            RPC-EPMap
LocalPort:                            RPC
LocalPort:                            RPC-EPMap
LocalPort:                            1701
LocalPort:                            Any
LocalPort:                            1723

Check out link below for more Netsh commands or click the labels below:


Popular posts from this blog

Copy a single file using robocopy

Copy a single file using robocopy from a local folder to a shared folder on the network.
A simple rule of thumb before any disaster strike, don't interchange the source and the destination.

If source and destination is mistakenly reverse, files might get overwritten. To avoid any loss of data do a test with a dummy file to ensure things work perfectly.
Robocopy [source][destination]   [file to be copied]
robocopy c:\local_c_folder  \\PC_network\shared_folder   file_to_be_copied_xx.txt
The command will be completed successfully provided the network access right has no issues.

Robocopy works quite good on large files. A simple copy or xcopy command will also work but the speed might vary.

Robocopy is free it can be accessed from command line. No need to install the resource kit tool if the operating system is Windows 7 or newer version.

Copy files with selected file extension using PowerShell and Robocopy:

$extension = ('.pdf', '.jpg', '.txt')
gci d:\WorkFolde…

WMIC get computer name

WMIC get computer model, manufacturer, computer name and  username.
WMIC is a command-line tool and that can generate information about computer model, its manufacturer, its username and other informations depending on the parameters provided.
Why would you need a command line tool if there’s a GUI to check?
If you have 20 or 100 computers, or even more. It’s quite a big task just checking the GUI to check the computer model and username.
If you have remote computers, you need to delegate someone in the remote office or location to check.
Or you can just write a batch file or script to automate the task.
Here’s the code below on how get computer model, manufacturer and the username.
Open an elevated command prompt and type:
wmic computersystem get "Model","Manufacturer", "Name", "UserName"
Just copy and paste the code above, the word “computersystem” does not need to be change to a computer name.
A sample output below will be generated if the co…