skip to main content
Firewall Protection Tab
Configure the following settings:
Firewall Protection Settings
Enable Firewall Protection – select the checkbox to enable Firewall Protection. Firewall Protection prevents hackers or malicious software from gaining access to your computer through the Internet or the network.
Allow users to disable firewall – select this option to allow users to disable the firewall at the computer.
Enable Firewall Logging – select this option to log all actions related to the Firewall.
Firewall Rules
Configure settings for Program Rules, Network Rules, Advanced Rule, Intrusion Rules, and Trusted Zones.
Program Rules
Program Rules define the action taken by the firewall on the network activity to and from an application. Program Rules have priority over the default rules. Default rules can be edited but cannot be deleted.
Click Add to add a new Program Rule. Specify or select the options and click OK. The following parameters are displayed:
Name – name of the rule.
Program – name of the program, including full path and extension.
Trusted Zone Inbound – the action to be taken for inbound communication to the program in a Trusted Zone (Allow, Block or Prompt).
Trusted Zone Outbound – the action to be taken for outbound communication from the program in a Trusted Zone (Allow or Block).
Untrusted Zone Inbound – the action to be taken for inbound communication to the program in an Untrusted Zone (Allow or Block).
Untrusted Zone Outbound – the action to be taken for inbound communication from the program in an Untrusted Zone (Allow or Block).
Click the Edit icon to modify or click the Delete icon to delete.
Network Rules
Network Rules define the action taken by the firewall on the network activity. Network Rules can be edited but cannot be deleted. Select the Network Rules for the following:
 
Name
Description
Trusted Zone Inbound
Trusted Zone Outbound
Untrusted Zone Inbound
Untrusted Zone Outbound
IGMP
Internet Group Management Protocol
Select Allow or Block
Select Allow or Block
Select Allow or Block
Select Allow or Block
Ping
Ping and Tracert
Select Allow or Block
Select Allow or Block
Select Allow or Block
Select Allow or Block
OtherIcmp
Other ICMP packets
Select Allow or Block
Select Allow or Block
Select Allow or Block
Select Allow or Block
DHCP
Dynamic Host Configuration Protocol
Select Allow or Block
Select Allow or Block
Select Allow or Block
Select Allow or Block
DNS
Domain Name System
Select Allow or Block
Select Allow or Block
Select Allow or Block
Select Allow or Block
VPN
Virtual Private Network
Select Allow or Block
Select Allow or Block
Select Allow or Block
Select Allow or Block
LDAP
Lightweight Directory Access Protocol
Select Allow or Block
Select Allow or Block
Select Allow or Block
Select Allow or Block
Kerberos
Kerberos Protocols
Select Allow or Block
Select Allow or Block
Select Allow or Block
Select Allow or Block
NETBIOS
Microsoft File and Printer Sharing
Select Allow or Block
Select Allow or Block
Select Allow or Block
Select Allow or Block
Advanced Rules
Advanced Rules define the action taken by the firewall for the specified application, port or protocol. This may include a single or a combination of protocol, local or remote ports, and direction of traffic. You can add, edit or delete an advanced rule.
Advanced Rules are processed in the order in which they are listed. Any user-defined advanced rules will take precedence over the pre-defined Advanced Rules.
Click Add to add a new Advanced Rule. Specify or select the options and click OK. The following parameters are displayed in the Advanced Rules pane:
Name – name of the rule.
Program – name of the program and path.
Action – the action taken by the Firewall for communication from the specified application, port or protocol (Allow, Block or Prompt).
Direction – the direction of communication (Both, In or Out).
Protocol – the name of the protocol.
Local Port – details of the local port.
Remote Port – details of the remote port.
Click the Edit icon to modify or click the Delete icon to delete.
Trusted Zones
Trusted Zones specify computers, networks and IP addresses that are trusted. Network traffic from and to the Trusted Zones are not blocked. Trusted Zones and Internet (Non-Trusted) Zones can be treated differently by Program and Network Rules.
Click Add to add a new Trusted Zone. Specify or select the options and click OK. The following parameters are displayed:
Name – name of the Trusted Zone.
Description – description of the Trusted Zone.
Type – type of the Trusted Zone (IP Address or Network).
Click the Edit icon to modify or click the Delete icon to delete.
Advanced Firewall Protection Settings
Enable Process protection – select this option to enable process protection. This feature is used to set the action for unknown code injectors and to add your own allowed code injectors based on the settings in the Process Protection pane.
Enable boot time protection – select this option to enable boot time protection. Boot time protection protects your computer when it starts, blocking traffic from occurring before Windows has a chance to open.