Firewall Protection Tab

Configure the following settings:

Firewall Protection Settings

  • Enable Firewall Protection – select the checkbox to enable Firewall Protection. Firewall Protection prevents hackers or malicious software from gaining access to your computer through the Internet or the network.

  • Allow users to disable firewall – select this option to allow users to disable the firewall at the computer.

  • Enable Firewall Logging – select this option to log all actions related to the Firewall.

Firewall Rules

Configure settings for Program Rules, Network Rules, Advanced Rule, Intrusion Rules, and Trusted Zones.

Program Rules

Program Rules define the action taken by the firewall on the network activity to and from an application. Program Rules have priority over the default rules. Default rules can be edited but cannot be deleted.

Click Add to add a new Program Rule. Specify or select the options and click OK. The following parameters are displayed:

  • Name – name of the rule.

  • Program – name of the program, including full path and extension.

  • Trusted Zone Inbound – the action to be taken for inbound communication to the program in a Trusted Zone (Allow, Block or Prompt).

  • Trusted Zone Outbound – the action to be taken for outbound communication from the program in a Trusted Zone (Allow or Block).

  • Untrusted Zone Inbound – the action to be taken for inbound communication to the program in an Untrusted Zone (Allow or Block).

  • Untrusted Zone Outbound – the action to be taken for inbound communication from the program in an Untrusted Zone (Allow or Block).

Click the Edit icon to modify or click the Delete icon to delete.

Network Rules

Network Rules define the action taken by the firewall on the network activity. Network Rules can be edited but cannot be deleted. Select the Network Rules for the following:

Name
Description
Trusted Zone Inbound
Trusted Zone Outbound
Untrusted Zone Inbound
Untrusted Zone Inbound

IGMP

Internet Group Management Protocol

Select Allow or Block

Select Allow or Block

Select Allow or Block

Select Allow or Block

Ping

Ping and Tracert

Select Allow or Block

Select Allow or Block

Select Allow or Block

Select Allow or Block

OtherIcmp

Other ICMP packets

Select Allow or Block

Select Allow or Block

Select Allow or Block

Select Allow or Block

DHCP

Dynamic Host Configuration Protocol

Select Allow or Block

Select Allow or Block

Select Allow or Block

Select Allow or Block

DNS

Domain Name System

Select Allow or Block

Select Allow or Block

Select Allow or Block

Select Allow or Block

VPN

Virtual Private Network

Select Allow or Block

Select Allow or Block

Select Allow or Block

Select Allow or Block

LDAP

Lightweight Directory Access Protocol

Select Allow or Block

Select Allow or Block

Select Allow or Block

Select Allow or Block

Kerberos

Kerberos Protocols

Select Allow or Block

Select Allow or Block

Select Allow or Block

Select Allow or Block

NETBIOS

Microsoft File and Printer Sharing

Select Allow or Block

Select Allow or Block

Select Allow or Block

Select Allow or Block

Advanced Rules

Advanced Rules define the action taken by the firewall for the specified application, port or protocol. This may include a single or a combination of protocol, local or remote ports, and direction of traffic. You can add, edit or delete an advanced rule.

Advanced Rules are processed in the order in which they are listed. Any user-defined advanced rules will take precedence over the pre-defined Advanced Rules.

Click Add to add a new Advanced Rule. Specify or select the options and click OK. The following parameters are displayed in the Advanced Rules pane:

  • Name – name of the rule.

  • Program – name of the program and path.

  • Action – the action taken by the Firewall for communication from the specified application, port or protocol (Allow, Block or Prompt).

  • Direction – the direction of communication (Both, In or Out).

  • Protocol – the name of the protocol.

  • Local Port – details of the local port.

  • Remote Port – details of the remote port.

Click the Edit icon to modify or click the Delete icon to delete.

Trusted Zones

Trusted Zones specify computers, networks and IP addresses that are trusted. Network traffic from and to the Trusted Zones are not blocked. Trusted Zones and Internet (Non-Trusted) Zones can be treated differently by Program and Network Rules.

Click Add to add a new Trusted Zone. Specify or select the options and click OK. The following parameters are displayed:

  • Name – name of the Trusted Zone.

  • Description – description of the Trusted Zone.

  • Type – type of the Trusted Zone (IP Address or Network).

Click the Edit icon to modify or click the Delete icon to delete.

Advanced Firewall Protection Settings

  • Enable Process protection – select this option to enable process protection. This feature is used to set the action for unknown code injectors and to add your own allowed code injectors based on the settings in the Process Protection pane.

  • Enable boot time protection – select this option to enable boot time protection. Boot time protection protects your computer when it starts, blocking traffic from occurring before Windows has a chance to open.

Last updated