fwg

1.0.17 • Public • Published

fwg

A Windows command line tool to block outbound connections for files within a directory.

fwg utilizes the power of PowerShell and Windows Network Shell to bulk create firewall rules for a specified folder and targeted files.

Features

  • Bulk generate firewall rules for executables
  • Target specific files with wildcard support
  • Remove generated firewall rules

Installation

To use fwg in the terminal, install with the -g option

npm install -g fwg

Unauthorized Access Error

If Powershell scripts are disabled on the system, running fwg may invoke an UnauthorizedAccess error. To modify the execution policy, run in PowerShell

Set-ExecutionPolicy -ExecutionPolicy Bypass

To reset the execution policy, run in PowerShell

Set-ExecutionPolicy -ExecutionPolicy Default

Usage

Command must be run with administrator privileges!

fwg TARGET-DIRECTORY [-l -r] FILE-TARGETS...

*.exe executables are selected by default. User-provided file targets will override this selector.

Options

Options must be typed separately

-r

      Remove generated firewall rules (if exists)

-l

      Saves output to a new log file in %INSTALLATION_DIRECTORY%/logs/

Examples

This command would block all outbound connections from executables and installers within the user's downloads folder and generate a log file.

fwg ~/Downloads -l *.exe *.msi *.msp

fwg also works with relative paths. This command will run fwg in the current directory of the console and block executables (set by default).

fwg ./

This command will remove generated firewall rules for any executable matching the pattern *Launcher.exe in the user's Documents folder.

fwg ~/Documents -r *Launcher.exe

Package Sidebar

Install

npm i fwg

Weekly Downloads

0

Version

1.0.17

License

MIT

Unpacked Size

8.64 kB

Total Files

4

Last publish

Collaborators

  • waymondrang