Event ID 4958 — Firewall Rule Processing

Updated: January 9, 2008

Applies To: Windows Server 2008

yellow

Windows Firewall with Advanced Security receives its rules from local security policy stored in the system registry, and from Group Policy delivered by Active Directory. After receiving a new or modified policy, Windows Firewall must process each rule in the applied policies to interpret what network traffic is to be blocked, allowed, or protected by using Internet Protocol security (IPsec).

When appropriate auditing events are enabled (http://go.microsoft.com/fwlink/?linkid=92666), Windows reports successes and failures, both in retrieving policy and in processing the rules defined in the policy.

Event Details

Product: Windows Operating System
ID: 4958
Source: Microsoft-Windows-Security-Auditing
Version: 6.0
Symbolic Name: SE_AUDITID_ETW_FIREWALL_RUNTIME_ERROR
Message: Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer:

Rule Information:
%tID:%t%1
%tName:%t%2

Error Information:
%tError:%t%3
%tReason:%t%4

Resolve

Review rule for applicability to local computer

Windows Firewall with Advanced Security processed a rule that contains parameters that cannot be resolved on the local computer. The rule is therefore not enforcable on the computer and so is excluded from the runtime state of the firewall.  This is not necessarily an error. Examine the rule for applicability on the computers to which it was applied.

For example, if a connection security rule indicates that network traffic is to be encrypted with a specific security algorithm, and that algorithm is not available on the computer, then the rule cannot be successfully applied. To resolve this condition, review the rule to ensure that it uses only those features that are supported by the versions of Windows to which it will be applied. 

Verify

You can verify that your computer is successfully retrieving and processing firewall and Internet Protocol security (IPsec) settings and rules by examining the Event Viewer logs and looking for messages that indicate successful firewall policy processing. To ensure that your computer is creating the appropriate events as required, see http://go.microsoft.com/fwlink/?linkid=92666.

To verify that firewall policy is being retrieved and processed correctly:

  1. Refresh Group Policy. Open an administrative command prompt. Click Start, click All Programs, click Accessories, right-click Command Prompt, and then click Run as administrator. At that command prompt, run the command gpupdate /force.
  2. After the policy refresh is complete, examine the Event log for the following event IDs:
    • 4945-4948. These messages indicate successful processing of locally stored firewall policy.
    • 4954-4955. This message indicates successful processing of Group Policy-provided firewall policy.
    • 5040-5049. These messages indicate successful processing of IPsec policy.

The presence of one or more of those event messages when a changed policy is received is an indication that policy is being received and processed correctly.

You can also change a rule (in locally stored policy or a Group Policy object), and then examine the rules on the computer to confirm that the changed rule was received and processed correctly. Use the Windows Firewall with Advanced Security Microsoft Management Console (MMC) snap-in or the netsh advfirewall command-line tool to examine the rules on the local computer. The exact branch in the snap-in or the netsh command to use depends on the rule that you want to change.

Related Management Information

Firewall Rule Processing

Windows Firewall with Advanced Security

Community Additions

ADD
Show: