SystemRequires admin/root

Firewall Logs

Windows Defender Firewall can write packet and connection activity to text log files in %WinDir%\System32\LogFiles\Firewall so administrators can audit dropped packets and allowed connections. These rotating plaintext logs grow as the system records source and destination IPs, ports, protocols, and action results for troubleshooting and security review. Kudu removes old firewall log files from this folder to reclaim disk space without touching firewall rules, profiles, saved settings, accounts, or passwords.

Why clean Firewall Logs?

  • Large pfirewall.log files accumulate from constant connection logging and can consume noticeable space on small system drives, which shows up as reduced free space in Windows even when no personal files were added
  • Very old dropped-packet entries make current troubleshooting harder because recent blocks are buried in stale history, so admins may open the log and have trouble spotting what is happening now
  • Long continuously appended log files are slower to open in Notepad or other viewers, causing delays or freezing when trying to inspect recent firewall activity during network problems
  • Verbose logging left enabled after debugging can produce rapid log growth from routine background traffic, and users may notice the Windows folder steadily increasing in size over days or weeks
  • Cleaning old firewall logs removes obsolete evidence from previous network setups, reducing confusion when the machine has changed routers, VPNs, or IP ranges and the log still contains misleading historical entries
  • Access to this folder requires administrative rights, so failed manual cleanup attempts often show permission errors; using a cleaner with elevation removes the stale logs safely while leaving active firewall configuration intact
What gets cleaned

Cache paths Kudu targets

Windows

%WinDir%/System32/LogFiles/Firewall
Frequently asked

Common questions about Firewall Logs

Free & open source

Download Kudu and reclaim your disk space.

Available on Windows, macOS, and Linux. No account required, no feature gates, no telemetry without consent. All cleaning targets are open source and community-auditable.