Using your own computer, explain step-by-step how you would locate and enable the firewall log and monitor your own network traffic.

All firewalls have some type of logging feature. This feature documents how the firewall handled various types of network traffic. The logs, if enabled, provide valuable information like source and destination IP addresses, port numbers, and protocols. You can also use the Windows Firewall log file to monitor TCP and UDP connections and packets that are blocked by the firewall. Using your own computer, explain step-by-step how you would locate and enable the firewall log and monitor your own network traffic. Provide “screenshots” to document this process. What would you be able to determine from logging the firewall activity?

Posted in Uncategorized

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount