Object Access Event: 5155

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Object Access » Object Access Event: 5155

Event ID 5155 – The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.

Event ID 5155
Category Object Access: Filtering Platform Connection
Type Success Audit

Event 5155 is logged when an application or service has been blocked from listening on a port for connections by the WFP. By default, Windows Firewall will not block such listening activities, and thus, the such a filter must be manually added using the WFP API.

An example of 5155 event log:

The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.

Application Information:

Process ID:%1

Application Name:%2

Network Information:

Source Address:%3

Source Port:%4

Protocol:%5

Filter Information:

Filter Run-Time ID:%6

Layer Name:%7

Layer Run-Time ID:%8

Why does event ID 5155 need to be monitored?

Event 5155 can be used for troubleshooting if Windows Filtering Platform APIs are used to block applications and services manually.

Event 5155 applies to the following operating systems:

  • Windows 2008 R2 and 7
  • Windows 2012 R2 and 8.1
  • Windows 2016 and 10

Corresponding event in Windows 2003 and before: 861