PowerShell/Scripts/add-firewall-rules.ps1

55 lines
1.6 KiB
PowerShell
Raw Normal View History

2021-01-28 15:02:16 +01:00
#!/snap/bin/powershell
<#
.SYNTAX ./add-firewall-rules.ps1 [<path-to-executables>]
.DESCRIPTION adds firewall rules for the given executables, administrator rights are required
.LINK https://github.com/fleschutz/PowerShell
.NOTES Author: Markus Fleschutz / License: CC0
#>
#Requires -RunAsAdministrator
2021-02-01 08:25:03 +01:00
param([string]$PathToExecutables = "")
2021-01-28 15:02:16 +01:00
$command = '
$output = ''Firewall rules for path '' + $args[0]
write-output $output
for($i = 1; $i -lt $args.count; $i++){
$path = $args[0]
$path += ''\''
$path += $args[$i]
$null = $args[$i] -match ''[^\\]*\.exe$''
$name = $matches[0]
$output = ''Adding firewall rule for '' + $name
write-output $output
$null = New-NetFirewallRule -DisplayName $name -Direction Inbound -Program $path -Profile Domain, Private -Action Allow
}
Write-Host -NoNewLine ''Done - press any key to continue...'';
2021-02-01 08:25:03 +01:00
[void]$Host.UI.RawUI.ReadKey(''NoEcho,IncludeKeyDown'');
2021-01-28 15:02:16 +01:00
'
2021-02-01 08:25:03 +01:00
try {
if ($PathToExecutables -eq "" ) {
$PathToExecutables = read-host "Enter path to executables"
2021-01-28 15:02:16 +01:00
}
2021-02-01 08:25:03 +01:00
$PathToExecutables = Convert-Path -Path $PathToExecutables
$Apps = Get-ChildItem "$PathToExecutables\*.exe" -Name
2021-01-28 15:02:16 +01:00
if($Apps.count -eq 0){
2021-02-01 08:25:03 +01:00
write-warning "No executables found. No Firewall rules have been created."
2021-01-28 15:02:16 +01:00
Write-Host -NoNewhLine 'Press any key to continue...';
2021-02-01 08:25:03 +01:00
[void]$Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown');
exit 1
2021-01-28 15:02:16 +01:00
}
2021-02-01 08:25:03 +01:00
$arg = "PathToExecutables $Apps"
Start-Process powershell -Verb runAs -ArgumentList "-command & {$command} $arg"
exit 0
} catch {
write-error "ERROR in line $($_.InvocationInfo.ScriptLineNumber): $($Error[0])"
exit 1
2021-01-28 15:02:16 +01:00
}