The windows filtering platform has blocked a packet

Solution: Windows Security Log Event ID 5152: The Windows Filtering Platform blocked a packetHave a look at this article may help you to troubleshoot this

11 Replies

  • Author Bryan Doe

    Is it the same source every time?  If so, look into that machine.  Protocol 17 is UDP.  Port 15600 could have a number of options.


    Was this post helpful?
    thumb_up
    thumb_down

  • Use WireShark to see what the source machine is send to it


    Was this post helpful?
    thumb_up
    thumb_down

  • Also, check out the destination address:  192.168.40.255   , the broadcast address   Other machines seeing this?


    Was this post helpful?
    thumb_up
    thumb_down

  • Author Adib Sarvestani

    there source IPs are different throughout different events. (mostly from other machines on the network)
    some are even 0.0.0.0
    and some destination addresses are also ending in x.255 which isn’t even valid
    and some are destined to 255.255.255.255


    Was this post helpful?
    thumb_up
    thumb_down

  • Author Bryan Doe

    What about the destination port?  Is that always the same?


    Was this post helpful?
    thumb_up
    thumb_down

  • Author Adib Sarvestani

    They are almost either 255.255.255.255 or 40.255 which are the broadcast addresses.


    Was this post helpful?
    thumb_up
    thumb_down

  • Author Bryan Doe

    I was asking about the port. Is it always 15600? That doesn’t seem like a random number. If it’s always that, it might point things in the right direction.


    Was this post helpful?
    thumb_up
    thumb_down

  • Author Adib Sarvestani

    Hey, Sorry i misread. 

    The destination ports are also different. 
    15600,8610,67,60103,etc..


    Was this post helpful?
    thumb_up
    thumb_down

  • Author Bryan Doe

    I’d probably start by tracking the destination ports.  If they’re completely random, that’s one thing, but if it’s the same handful over and over, that’s something to go on. 


    Was this post helpful?
    thumb_up
    thumb_down

  • Author Adib Sarvestani

    Thanks. 

    This was happening across the network on lots of computers. the group policy settings were set as not configured regarding this filtering platform packet drop.

    the solution seems to have reduced the amount of logs were being generated.

    Cheers!


    Was this post helpful?
    thumb_up
    thumb_down

  • Remove From My Forums
  • Question

  • HOW do you stop the Base Filtering Engine from filtering ports and programs?

    I have used BING (Because it’s not Google) and Google and the TechNet forums and the Microsoft forums and anything else that came up . No Luck finding this situation or anything like it except to turn off auditing. No thank you.

    Situation is we have a business Active Directory Domain (2012r2 Standard) Hosting a DNS internally for 100+ endpoints and a few weeks ago we started experiencing Latency in our network to the Internet and this has just gotten
    worse and worse and worse. The Intranet is working fine to our internally hosted sites and services from our internally hosted DNS. We originally thought it was some setting in our Firewall (cisco and the firepower configurations). Nope, Turned it off and
    still latent. Finally drilled down to our DNS Forwarders are not resolving to the Internet. (if you hit f5 enough you get through eventually) If you change the DNS to Directly go to a DNS Provider on the internet (e.g. 8.8.8.8) no problems, immediately
    access.

    This is affecting Both the Primary and Alt Domain Controller that are hosting DNS Services Internally. After throwing everything against the wall we can think of we finally determined that DNS (port 53) is being blocked by the Base Fileting Engine. When
    you disable this BFE service, This is actually the only service we stop and after this is stopped (yes, the dependent services also stopped). IT WORKS Again. Whala! DNS works with the Forwarders and all network computers are all happy and can go
    anywhere their hearts desire on the internet after my firewall filters them.

    Having this BFE service off is not a good idea according to the internet unless you are a Trojan.  

    Attempted:

    — Firewall on and off. (with access allowed.)

    — Antivirus on and off.

    — Different DNS Forwarders.

    — SFC /Scannow

         C:Windowssystem32>sfc /scannow

         Beginning system scan.  This process will take some time.

         Beginning verification phase of system scan.
         Verification 100% complete.

         Windows Resource Protection did not find any integrity violations.

    — Read documentation on the server on Microsoft.

    Now Attempting to post a question on the TechNet Forums. Next I think we will start uninstalling updates till it starts working again. (maybe)

    The Events below from the event log helped us narrow this down with some Internet search’s for how to disable this BFE service.

    Event 5152

    The Windows Filtering Platform has blocked a packet.

    Application Information:

    Process ID: 4992

    Application Name: deviceharddiskvolume6windowssystem32dns.exe

    Network Information:

    Direction: Inbound

    Source Address: 192.168.xxx.xxx (Network PC)

    Source Port: 4279

    Destination Address: 192.168.xxx.xxx (DNS Server)

    Destination Port: 53

    Protocol: 17

    Filter Information:

    Filter Run-Time ID: 69167

    Layer Name: Receive/Accept

    Layer Run-Time ID: 44

    EVENT ID 5157

    The Windows Filtering Platform has blocked a connection.

    Application Information:

    Process ID: 1904

     

    Application Name: deviceharddiskvolume6windowssystem32dns.exe

    Network Information:

    Direction: Inbound

    Source Address: 192.168.xxx.xxx (DNS Server)

    Source Port: 53

    Destination Address: 192.168.xxx.xxx (Network PC)

    Destination Port: 53541

    Protocol: 17

    Filter Information:

    Filter Run-Time ID: 67692

    Layer Name: Receive/Accept

    Layer Run-Time ID: 44

  • Remove From My Forums
  • Question

  • We have a Windows Server 2008 R2 DC.  The Event Viewer Security log on this server is generating lots of 5152 events ffrom various source IP addresses saying that the Windows Filtering Platform blocked a packet to port 389.

    The Windows Firewall on this server has the default Active Directory rules enabled allowing incoming connections on port 389 and I haven’t had any issues reported relating to Active Directory from users on the network.

    Anybody have an idea why I’m getting these audit failures even with port 389 allowed through the Windows Firewall?

    • Edited by

      Friday, March 30, 2012 12:50 PM

Windows 11, the latest version of this series from Microsoft, is considered the most advanced and user-centric. However, error detection remains as frequent, if not more frequent, than in the previous version. In this article, we will look at that Windows filtering platform blocked problem with connection.

The error occurs when certain packets or connections are blocked by the underlying filtering mechanism. While the problem may seem daunting to most users, the solutions are fairly straightforward and are listed in the following sections.

For those facing the error in Windows 11, it is likely that the update was not successful and there is some error in Windows Firewall.

But before we get into the fixes, you need to understand the role of the Windows Filtering Platform and its core functionality.

How does the Windows Filtering Platform help developers?

The Windows Filtering Platform, set of system services, and APIs (Application Programming Interface) enable developers to create network filtering applications. It was first introduced in Windows Vista and has been part of the Windows ecosystem ever since.

It can also be used to build independent firewalls, antivirus and other network applications. This allows the application to access and modify the packages while they are being processed.

The three main features of the Windows Filtering Platform are:

  • Basic engine filter
  • Generic Filter Engine
  • Callout modules

Now that you are familiar enough with the concept, let’s move on to the most efficient fixes for Windows filtering platform that blocked problem with connection in Windows 11.

How can I fix the connection error blocked by the Windows Filtering Platform in Windows 11?

1. Disable your firewall.

  • Press Windows+, Sto open the menu Search … Enter Windows Defender Firewall into the text box at the top and click the corresponding search result that appears.

  • Then press Turn Windows Defender Firewall on or off in the parameter list on the left.

  • Check the boxes for Disable Windows Defender Firewall (not recommended) how in private network settings, so and Settings public network And click the OK below to save your changes.

After making the changes, restart the system and check if has the Windows filtering platform blocked problem with connection, fixed in Windows 11. If not, skip to the fix below.

2. Run the DISM tool.

  • Press Windows+, Sto open the menu Search … Enter Windows Terminal into the text box at the top, right-click the relevant search result and select Release on behalf of administrator in the context menu.

  • Press Yes in a pop-up window UAC (User Account Control) .

  • Click the down arrow at the top and select Command line from the parameter list. Alternatively, you can press Ctrl+ Shift+, 2to start it command line in a new tab in Windows Terminal .

  • Then paste the following command and press, Enterto execute it: DISM/Online /Cleanup-image /Scanhealth

  • Finally, run the following command: DISM/Online /Cleanup-image /Restorehealth

3. Perform a quick SFC scan.

  • Press Windows+, Rto run the command » Run « … Enter wt into the text box, press and hold the keys Ctrl+ Shiftand then either press OK or press, Enterto start it windows terminal with increased privileges .

  • Press Yes в answer to request UAC (User Account Control) .

  • Click the down arrow and select Command line in the menu that appears.

  • Then type / paste the following command and click, Enterto start scanning SFC :sfc /scannow

An SFC (System File Checker) scan is used to identify corrupted system files and, if found, replaces them with a cached copy stored on the system. So, if corrupted system files are the reason why Windows filtering platform blocked problem with connection on Windows 11, running an SFC scan should fix this.

After executing the command, wait for the scan to complete, then restart your computer and check if the problem is resolved.

4. Restart Windows Security Center.

  • Press Windows+, Rto run the command » Run « … Enter services.msc in the text box and either click » OK», or press, Enterto run the application » Services « .

  • Find and double click the service firewall Windows Defender .

  • Make sure in service status indicated » Working» .

  • If not, click the » Start «in section » Service status «, to start the service.

  • Then press Windows +, Sto open the search menu. Enter Windows Terminal into the text box, right-click the corresponding search result that appears and select Release on behalf of administrator from the context menu.

  • Press Yes in the emerging UAC (User Account Control) prompt .

  • Then run the following command and restart your computer:reg add "HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindows Defender" /v "DisableAntiSpyware" /d 1 /t REG_DWORD /f

  • After restarting your computer, paste the following command and click Enter:reg add "HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindows Defender" /v "DisableAntiSpyware" /d 0 /t REG_DWORD /f

After that, restart your computer again and check if has the Windows filtering platform blocked problem with connection in Windows 11.

5. Disable your antivirus.

  • Press Windows+, Sto open the menu Search … Enter Windows security into the text box at the top, and then click the corresponding search result that appears.

  • Click the Protection from viruses and threats .

  • Click » Settings Management «in section » Virus and threat protection settings ”.

  • Then press the switch in the section Protection в real time, to disable the antivirus.

  • Finally press Yes в the UAC (User Account Control) prompt that appears .

Antivirus is often known to conflict with network settings and lead to many errors. This usually happens with third-party antiviruses, but Windows built-in security is sometimes at fault as well.

Hence, if the above fixes did not work, you can try disabling your antivirus and check if Has the Windows filtering platform blocked problem with connection, fixed in Windows 11.

If the error persists, uninstall the third-party antivirus app and check if that changes the situation.

6. Create a new local account.

In many cases, it was the damage to the user account that caused Windows filtering platform blocked problem with connection… If this is the case and the above methods fixed it, you can create a new local account on your Windows 11 PC.

While there is a lot of controversy about whether you should use a Microsoft account or a local account, the latter should be the best choice here as it is not tied to any servers and can be used independently on the device.

After creating a new local account, the error should no longer appear in event viewer.

Which is better, Windows 11 or Windows 10?

After Windows 11 finally launched, most of them were only too happy to get their hands on the latest version. But many users are skeptical about the upgrade due to various factors.

The main reason is that they are used to Windows 10 and it will take a while to get familiar with the new OS. But that’s not a compelling enough reason, as Windows 11 offers a slightly better user experience as well as many other features and security enhancements designed to improve your experience.

That’s all there is to it Windows filtering platform that blocked problem with connection in Windows 11 along with the most appropriate fixes for it.

In case the above methods do not eliminate that Windows filtering platform blocked mistake package, you can either perform a system restore or reset Windows 11 to factory settings.

Tell us which fix worked and your thoughts on the debate between Windows 11 and Windows 10 in general in the comments section below.


I’m running Windows 2008 R2 and I have IIS7/MySQL hosting several websites. However, I’ve recently been having seemingly random connection errors, perhaps one out of 50 times.

I took a look at the event viewer and there are lots of blocked packets to post 80 from many different IPs at the time of the problems, including my own (event viewer log attached at bottom of post).

It looks like WFP is blocking some legitimate requests, but I’ve set up the firewall to allow all port 80 web traffic connections… so how can they be blocked?

LOG:

The Windows Filtering Platform has blocked a packet.

Application Information:    
    Process ID:     0   
    Application Name:   -

Network Information:    
    Direction:           Inbound
    Source Address:      xxx.xxx.xxx.xxx
    Source Port:         57578
    Destination Address: xxx.xxx.xxx.xxx
    Destination Port:    80
    Protocol:            6

Filter Information:
    Filter Run-Time ID:  74587
    Layer Name:          Transport
    Layer Run-Time ID:   13

rsbarro's user avatar

rsbarro

3301 silver badge10 bronze badges

asked Aug 10, 2011 at 18:15

Ian's user avatar

1

If you really want to get the bottom of this kind of problem you will have to perform a WFP (Windows Filtering Platform) capture.

To start a capture use the following command:

netsh wfp capture start

Then you should reproduce your problem to include it in the capture. After that you use the following command to stop the capture:

netsh wfp capture stop

The result of the capture is stored in the file wfpdiag.cab in the current directory. I believe this file only is intended for internal use by Microsoft but if you want to you can extract the two files in the archive and have a look yourself.

The .etl can be opened using Event Log. However, I’m not sure how to interpret the contents. The interesting file is the .xml file. If you spend some time you should be able to figure out the structure of the contents. What you should be looking for is the following:

Filter Run-Time ID: 74587

By inspecting the XML you need to find which filter has run-time ID 74587. This will tell you which rule in the firewall blocked the connection. Note that the firewall has some hidden rules (e.g. Windows Firewall service hardening rules).

answered Aug 18, 2012 at 22:50

Martin Liversage's user avatar

As mentioned here, it is likely these Event Log entries (with Event ID 5152) are due to malicious requests, possibly sent by legitimate users of your web site that have virus infected machines. Viruses such as Code Red propogated in this manner by infecting IIS powered websites. IIS/WFP is most likely blocking and logging the malicious requests.

Assuming that this is the case, there’s not much to do here. If you determine that all of the requests are coming from one IP, you could block that IP at the firewall level. If they’re from all over the place and you don’t want to be bothered with the Event Log entries anymore, then you could turn off the Audit Logging of these events (not that I would necessarily recommend doing so). If you do want to disable logging, you can make use of the auditpol.exe command.

View the Audit Logging settings for Events 5152 and 5153:

auditpol /get /subcategory:"Filtering Platform Packet Drop"

Disable the Audit Logging of failures for Events 5152 and 5153:

auditpol /set /subcategory:"Filtering Platform Packet Drop" /failure:disable

More information on the Audit Policies be found at:
http://msdn.microsoft.com/en-us/library/windows/desktop/bb309058(v=vs.85).aspx

Gyum Fox's user avatar

answered Dec 13, 2011 at 18:26

rsbarro's user avatar

rsbarrorsbarro

3301 silver badge10 bronze badges

Operating Systems Windows 2008 R2 and 7

Windows 2012 R2 and 8.1

Windows 2016 and 10

Windows Server 2019 and 2022

Category
 • Subcategory
Object Access
 • Filtering Platform Connection
Type Success
Corresponding events
in Windows
2003
and before
 

5150: The Windows Filtering Platform has blocked a packet.

On this page

  • Description of this event
  • Field level details
  • Examples
  • Discuss this event
  • Mini-seminars on this event

The Windows Filtering Platform has blocked a packet.
 

This event is documented as appearing new to Windows 2008 Release 2 and Windows 7. But we’ve never seen it logged. See event ID 5152 instead.

Free Security Log Resources by Randy

  • Free Security Log Quick Reference Chart
  • Windows Event Collection: Supercharger Free Edtion
  • Free Active Directory Change Auditing Solution
  • Free Course: Security Log Secrets

Description Fields in
5150

Network Information:
 Direction:  %1
 Source Address:  %2
 Destination Address: %3
 EtherType:  %4
 EncapMethod:  %5
 SnapControl:  %6
 SnapOui:  %7
 VlanTag:   %8

Filter Information:
 Filter Run-Time ID: %9
 Layer Name:  %10
 Layer Run-Time ID: %11

Supercharger Free Edition

Your entire Windows Event Collection environment on a single pane of glass.

Free.

Examples of 5150

Top 10 Windows Security Events to Monitor

Free Tool for Windows Event Collection

Mini-Seminars Covering Event ID 5150

  • How to Monitor Network Activity with the Windows Security & Firewall Logs to Detect Inbound and Outbound Attacks

Upcoming Webinars

    Additional Resources

      Если у вас в журнале безопасности регистрируется довольно много сообщений с Event ID 5156, которые сообщают что

      The Windows Filtering Platform has allowed a connection

      и вы хотите их отключить, сделайте следующее:

      • Запустите gpedit.msc
      • Перейдите в ветку «Computer Configuration/Windows Settings/Security Settings/Local Policies/Security Options».
      • Убедитесь что у вас, в Windows 2008, включена опция:  «Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings».

      После этого нужно воспользоваться командой «auditpol». Введите команду:

      auditpol /set /subcategory:"Filtering Platform Connection" /success:disable /failure:enable

      Если же вам хочется еще отключить и такие сообщения:

      The Windows Filtering Platform blocked a packet

      То выполняем команду:

      auditpol /set /subcategory:"Filtering Platform Packet Drop" /failure:disable

      Хотя, если честно, после жалоб «безопасника» на сообщения не несущие полезную информацию сообщения я отключаю вот так :

      auditpol /set /subcategory:"Filtering Platform Connection" /success:disable /failure:disable
      
      auditpol /set /subcategory:"Filtering Platform Packet Drop" /success:disable /failure:disable

      Чтоб посмотреть синтаксис этой команды введите в командной строке:

      auditpol /?

      Чтоб получить список всех категорий и под категорий введите:

      auditpol /list /subcategory:*

      Чтоб отобразить текущую политику аудита для всех категорий и подкатегорий введите:

      auditpol /get /category:*

      Начиная с Windows Server 2008 R2 (серверные ОС) и Windows 7 (не серверные ОС) в политиках по адресу  «Computer Configuration/Windows Settings/Security Settings/Advanced Audit Policy Configuration» появились более тонкие настройки аудита из более чем 50-ти различных настроек политики — Advanced Security Audit Policy Settings.

      Если при использовании команды auditpol выскакивает «ошибка 0x00000057 произошла: Параметр задан неверно.», то скорее всего вы используете не тот язык в названии категорий, если ОС на русском языке, то категории аудита нужно писать на русском языке.

      Понравилось? =) Поделись с друзьями:

      Currently using Windows 2012 RDSH to present apps to the users.   I had an interesting event yesterday where users reported sluggishness on an app from one of the RDS servers and saw these entries in the audit logs.

      The Windows Filtering Platform has blocked a packet.

      Application Information:

      Process ID: 0

      Application Name: —

      Network Information:

      Direction: Bidirectional

      Source Address: 172.16.255.245

      Source Port: 49155

      Destination Address: 172.16.10.30

      Destination Port: 58564

      Protocol: 17

      Filter Information:

      Filter Run-Time ID: 70905

      Layer Name: Datagram Data

      Considering that protocol 17 is UDP and their using PCoIP it’s pretty safe to say that it may have been windows firewall causing grief for the end users and their experience.   I looked at the firewall and the firewall profiles for the domain was off while private and public were on.  

      has anyone encountered this previously?   Windows blocking/dropping UDP packets because of filtering but not all the time just sometimes? 

      Larry

      Понравилась статья? Поделить с друзьями:
    • The windows filtering platform has blocked a connection
    • The windows family of operating systems
    • The windows component message queuing is missing
    • The windows club ultimate windows tweaker
    • The windows clean every two weeks составить предложение