Object Access Event: 5153

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Object Access » Object Access Event: 5153

Event ID 5153 – A more restrictive Windows Filtering Platform filter has blocked a packet.

Event ID 5153
Category Object Access: Filtering Platform Packet Drop

Event 5153 is logged when a packet is blocked by a more restrictive Windows Filtering Platform. This event was first added to the Windows Server 2008 and Windows Vista versions.

An example of 5153 event log:

A more restrictive Windows Filtering Platform filter has blocked a packet.

Application Information:

Process ID:%1

Application Name:%2

Network Information:

Source Address:%3

Source Port:%4

Protocol:%5

Filter Information:

Filter Run-Time ID:%6

Layer Name:%7

Layer Run-Time ID:%8

Why does event ID 5153 need to be monitored?

Monitoring this event would help with detecting malicious activities and anomalies. The source of the blocked packet can be further investigated (identified by "Source Address").

Event 5153 applies to the following operating systems:

  • Windows 2008 R2 and 7
  • Windows 2012 R2 and 8.1
  • Windows 2016 and 10