--- title: 5031(F) The Windows Firewall Service blocked an application from accepting incoming connections on the network. (Windows 10) description: Describes security event 5031(F) The Windows Firewall Service blocked an application from accepting incoming connections on the network. ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library author: Mir0sh --- # 5031(F): The Windows Firewall Service blocked an application from accepting incoming connections on the network. **Applies to** - Windows 10 - Windows Server 2016 Event 5031 illustration ***Subcategory:*** [Audit Filtering Platform Connection](audit-filtering-platform-connection.md) ***Event Description:*** This event generates when an application was blocked from accepting incoming connections on the network by [Windows Filtering Platform](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366510(v=vs.85).aspx). If you don’t have any firewall rules (Allow or Deny) in Windows Firewall for specific applications, you will get this event from [Windows Filtering Platform](https://msdn.microsoft.com/en-us/library/windows/desktop/aa366510(v=vs.85).aspx) layer, because by default this layer is denying any incoming connections. > **Note**  For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
***Event XML:*** ``` - - 5031 0 0 12810 0 0x8010000000000000 304373 Security DC01.contoso.local - Domain C:\\documents\\listener.exe ``` ***Required Server Roles:*** None. ***Minimum OS Version:*** Windows Server 2008, Windows Vista. ***Event Versions:*** 0. ***Field Descriptions:*** - **Profiles** \[Type = UnicodeString\]: network profile using which application was blocked. Possible values: - Domain - Public - Private - **Application** \[Type = UnicodeString\]: full path and file name of executable file for blocked application. ## Security Monitoring Recommendations For 5031(F): The Windows Firewall Service blocked an application from accepting incoming connections on the network. - You can use this event to detect applications for which no Windows Firewall rules were created. - If you have a pre-defined application which should be used to perform the operation that was reported by this event, monitor events with “**Application**” not equal to your defined application. - You can monitor to see if “**Application**” is not in a standard folder (for example, not in **System32** or **Program Files**) or is in a restricted folder (for example, **Temporary Internet Files**). - If you have a pre-defined list of restricted substrings or words in application names (for example, “**mimikatz**” or “**cain.exe**”), check for these substrings in “**Application**.”