To disable Windows Filtering Platform (WFP) logging for UDP traffic, you need to modify some registry settings or use PowerShell commands :
With PowerShel :
You can use PowerShell to turn off WFP logging. Here's how to do it:
- Open PowerShell as Administrator.
- Run the following command to disable logging for UDP traffic
Set-NetFirewallProfile -Profile Domain,Private,Public -LogAllowed False
With the Registry Editor :
If you want to manually disable WFP logging for all traffic, including UDP, you can modify the Windows registry:
Warning: Be cautious while editing the registry. Incorrect changes can affect system stability.
Press Windows + R, type regedit
, and press Enter to open the Registry Editor.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\wfp\Logging
Find the "EnableLogging" entry on the right side.
- If it does not exist, you may need to create a new DWORD (32-bit) entry named EnableLogging.
Set its value to 0 (zero) to disable logging.
=> After modifying the registry, restart the system for the changes to take effect.
You should disable UDP Logging in Firewall Rules
To specifically control logging for UDP traffic, you can also look at your Windows Firewall settings to disable logging for specific protocols:
Open the Windows Defender Firewall with Advanced Security.
Under Inbound Rules, locate any UDP-related rules.
Right-click on the rule, and select Properties.
Go to the Advanced tab and uncheck Log dropped packets or Log successful connections, depending on your needs.