Given access to a firewall appliance or host-based firewall, incident responders must review firewall rules and logs to detect unauthorized, suspicious, or misconfigured entries that may indicate compromise.
Operator Note: Reviewing firewall rules and logs helps detect persistence mechanisms (e.g., backdoor ports), lateral movement, or data exfiltration paths.
Operator Note: Collaborate with firewall administrators to ensure rule and log completeness.
Firewall configuration and logs are reviewed. Any suspicious entries are documented and shared with incident commander for triage and remediation.
netsh advfirewall export "C:\firewall-config.wfw"
Get-NetFirewallRule | Format-Table Name, DisplayName, Enabled, Direction, Action
Get-NetFirewallRule -Direction Inbound -Action Allow
Operator Note: Pay special attention to ports 20-23, 3389, and high ephemeral ranges.
C:\Windows\System32\LogFiles\Firewall\pfirewall.log
sudo iptables -L -v -n
sudo firewall-cmd --get-active-zones
sudo firewall-cmd --list-all
sudo iptables-save > /tmp/iptables-backup.txt
Operator Note: Look for rules allowing unusual ports, IPs, or entire IP ranges.
show running-config
show running security-policy
Operator Note: Work with Firewall Engineers/Admins to pull exports. Look for “permit any any”, disabled zones, or suspicious policy changes.
Operator Note: Firewall management consoles provide easier rule review. Use CLI when console access is unavailable.
Platform | Tool | Purpose |
---|---|---|
Windows | netsh, PowerShell | Enumerate and export firewall rules |
Linux | iptables, firewalld | List and review local firewall rules |
Network Firewalls | CLI/GUI exports | Review security policy and NAT rules |
Universal | SIEM, Splunk | Correlate firewall logs with IOCs |
sudo iptables -L OUTPUT -v -n
Get-Content "C:\Windows\System32\LogFiles\Firewall\pfirewall.log" | Out-File firewall-log-review.txt
show archive config differences
Microsoft NetSecurity Module
Linux Iptables Docs
Palo Alto Networks CLI Guide
Cisco ASA Commands
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.0 | Initial version generated with enriched firewall rule and IOC review procedures | Leo |