Object Access Event: 5156

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Object Access » Object Access Event: 5156

Event ID 5156 – The Windows Filtering Platform has permitted a connection.

Event ID 5156
Category Object Access: Filtering Platform Connection
Type Success Audit

Windows logs event 5156 whenever the WFP allows for a connection between a program and a process via a TCP or UDP port. This other process can be on the same computer or a remote one. The process ID mentioned in this log will correspond to the process ID in the event 4688 log.

This event log contains the following information:

  • Process ID
  • Application Name
  • Direction
  • Source Address
  • Source Port
  • Destination Address
  • Destination Port
  • Protocol
  • Filter Run-Time ID
  • Layer Name
  • Layer Run-Time

Why does event ID 5156 need to be monitored?

  • To ensure specific applications do not perform certain operations
  • To monitor restricted applications
  • To ensure that the source address does not indicate external activity
  • To monitor whether the destination address is an IP address from the Internet
  • To ensure only whitelisted IP addresses are connected to
  • To check the protocol that is being used by certain applications

Event 5156 applies to the following operating systems:

  • Windows 2008 R2 and 7
  • Windows 2012 R2 and 8.1
  • Windows 2016 and 10