2021-09-27 10:38:12 +02:00
|
|
|
|
<#
|
2021-07-13 19:03:30 +02:00
|
|
|
|
.SYNOPSIS
|
2021-10-12 21:51:51 +02:00
|
|
|
|
Adds firewall rules for executables (needs admin rights)
|
2021-10-04 21:29:23 +02:00
|
|
|
|
.DESCRIPTION
|
2022-01-29 12:47:46 +01:00
|
|
|
|
This PowerShell script adds firewall rules for the given executable. Administrator rights are required.
|
2021-10-12 21:51:51 +02:00
|
|
|
|
.PARAMETER PathToExecutables
|
|
|
|
|
Specifies the path to the executables
|
2021-07-13 19:03:30 +02:00
|
|
|
|
.EXAMPLE
|
2023-08-06 21:35:36 +02:00
|
|
|
|
PS> ./add-firewall-rules.ps1 C:\MyApp\bin
|
2021-10-04 17:42:06 +02:00
|
|
|
|
Adding firewall rule for C:\MyApp\bin\app1.exe
|
|
|
|
|
Adding firewall rule for C:\MyApp\bin\app2.exe
|
|
|
|
|
...
|
2021-07-13 19:03:30 +02:00
|
|
|
|
.LINK
|
|
|
|
|
https://github.com/fleschutz/PowerShell
|
|
|
|
|
.NOTES
|
2022-09-06 21:42:04 +02:00
|
|
|
|
Author: Markus Fleschutz | License: CC0
|
2021-01-28 15:02:16 +01:00
|
|
|
|
#>
|
|
|
|
|
|
|
|
|
|
#Requires -RunAsAdministrator
|
|
|
|
|
|
2021-02-01 08:25:03 +01:00
|
|
|
|
param([string]$PathToExecutables = "")
|
2021-01-28 15:02:16 +01:00
|
|
|
|
|
|
|
|
|
$command = '
|
|
|
|
|
$output = ''Firewall rules for path '' + $args[0]
|
|
|
|
|
write-output $output
|
|
|
|
|
for($i = 1; $i -lt $args.count; $i++){
|
|
|
|
|
$path = $args[0]
|
|
|
|
|
$path += ''\''
|
|
|
|
|
$path += $args[$i]
|
|
|
|
|
|
|
|
|
|
$null = $args[$i] -match ''[^\\]*\.exe$''
|
|
|
|
|
$name = $matches[0]
|
|
|
|
|
$output = ''Adding firewall rule for '' + $name
|
|
|
|
|
write-output $output
|
|
|
|
|
$null = New-NetFirewallRule -DisplayName $name -Direction Inbound -Program $path -Profile Domain, Private -Action Allow
|
|
|
|
|
}
|
2021-02-10 19:25:48 +01:00
|
|
|
|
write-host -foregroundColor green -noNewline ''Done - press any key to continue...'';
|
2021-02-01 08:25:03 +01:00
|
|
|
|
[void]$Host.UI.RawUI.ReadKey(''NoEcho,IncludeKeyDown'');
|
2021-01-28 15:02:16 +01:00
|
|
|
|
'
|
|
|
|
|
|
2021-02-01 08:25:03 +01:00
|
|
|
|
|
|
|
|
|
try {
|
|
|
|
|
if ($PathToExecutables -eq "" ) {
|
|
|
|
|
$PathToExecutables = read-host "Enter path to executables"
|
2021-01-28 15:02:16 +01:00
|
|
|
|
}
|
2021-02-01 08:25:03 +01:00
|
|
|
|
|
|
|
|
|
$PathToExecutables = Convert-Path -Path $PathToExecutables
|
|
|
|
|
|
|
|
|
|
$Apps = Get-ChildItem "$PathToExecutables\*.exe" -Name
|
2021-01-28 15:02:16 +01:00
|
|
|
|
|
|
|
|
|
if($Apps.count -eq 0){
|
2021-02-01 08:25:03 +01:00
|
|
|
|
write-warning "No executables found. No Firewall rules have been created."
|
2021-01-28 15:02:16 +01:00
|
|
|
|
Write-Host -NoNewhLine 'Press any key to continue...';
|
2021-02-01 08:25:03 +01:00
|
|
|
|
[void]$Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown');
|
|
|
|
|
exit 1
|
2021-01-28 15:02:16 +01:00
|
|
|
|
}
|
2021-02-01 08:25:03 +01:00
|
|
|
|
|
|
|
|
|
$arg = "PathToExecutables $Apps"
|
|
|
|
|
Start-Process powershell -Verb runAs -ArgumentList "-command & {$command} $arg"
|
2021-09-27 10:09:45 +02:00
|
|
|
|
exit 0 # success
|
2021-02-01 08:25:03 +01:00
|
|
|
|
} catch {
|
2022-04-13 12:06:32 +02:00
|
|
|
|
"⚠️ Error in line $($_.InvocationInfo.ScriptLineNumber): $($Error[0])"
|
2021-02-01 08:25:03 +01:00
|
|
|
|
exit 1
|
2021-01-28 15:02:16 +01:00
|
|
|
|
}
|