fwg v1.0.17
fwg
A Windows command line tool to block outbound connections for files within a directory.
fwg utilizes the power of PowerShell and Windows Network Shell to bulk create firewall rules for a specified folder and targeted files.
Features
- Bulk generate firewall rules for executables
- Target specific files with wildcard support
- Remove generated firewall rules
Installation
To use fwg in the terminal, install with the -g option
npm install -g fwgUnauthorized Access Error
If Powershell scripts are disabled on the system, running fwg may invoke an UnauthorizedAccess error. To modify the execution policy, run in PowerShell
Set-ExecutionPolicy -ExecutionPolicy BypassTo reset the execution policy, run in PowerShell
Set-ExecutionPolicy -ExecutionPolicy DefaultUsage
Command must be run with administrator privileges!
fwg TARGET-DIRECTORY [-l -r] FILE-TARGETS...*.exe executables are selected by default. User-provided file targets will override this selector.
Options
Options must be typed separately
-r
Remove generated firewall rules (if exists)
-l
Saves output to a new log file in %INSTALLATION_DIRECTORY%/logs/
Examples
This command would block all outbound connections from executables and installers within the user's downloads folder and generate a log file.
fwg ~/Downloads -l *.exe *.msi *.mspfwg also works with relative paths. This command will run fwg in the current directory of the console and block executables (set by default).
fwg ./This command will remove generated firewall rules for any executable matching the pattern *Launcher.exe in the user's Documents folder.
fwg ~/Documents -r *Launcher.exe