Hi
I noticed that group policy has 2 settings to block inbound traffic
1. incoming connections that do not match a rule are blocked
or
2. All inbound connections are blocked
From the client side I'm looking to determine which of these inbound settings is the case.
I can do this with "netsh advfirewall show domainprofile firewallpolicy"
The output will differentiate with either BlockInbound or BlockinboundALL
I cant find this so far with powershell though
Ive tried a number of cmdlets including Get-NetFirewallProfile & GetNetFirewallSettingI
From the powershell results I can only see BLOCK for the inbound action even if the actual connection rule is BLOCKALL.
The output makes them look the same which seems inaccurate.
Is powershell able to differentiate between the incoming connection rule more specifically ?
Thanks
confuseis