Thanks all. Will review Pete's link and the rule. Here's what the packet log is generating for the blocked activity, which continues just about every minute. From other posts relating to similar issues, it looks like this is innocuous, but after yesterday's attack/attempt to use the PC as a spam bot, I just want to be sure.
Ethernet II (Packet Length: 149)
Destination: 33-33-00-01-00-02
Source: 00-1d-60-72-ec-bc
Type: IP (0x86dd)
Internet Protocol
Version: 6
HeTraffic Class: 0
Flow Label: 0
Payload Length: 95
Next Header: 17
Hop Limit: 1
(UDP - User Datagram Protocol)
Source: FE80:0:0:0:CD08:18AB:3FE:8581
Destination: FF02:0:0:0:0:0:1:2
User Datagram Protocol
Source port: 546
Destination port: 547
Length: 8
Checksum: 0x7325 (Incorrect - Checksum should be 0x7325)
Data (95 Bytes)
ader Length: 40 bytes