Assignment:
All firewalls have some type of logging feature. This feature documents how the firewall handled various types of network traffic. The logs, if enabled, provide valuable information like source and destination IP addresses, port numbers, and protocols. You can also use the Windows Firewall log file to monitor TCP and UDP connections and packets that are blocked by the firewall.
Using your own computer, explain step-by-step how you would locate and enable the firewall log and monitor your own network traffic. Provide screenshots to document this process. What would you be able to determine from logging the firewall activity?