— Allow users to disable firewall - select this option to allow users to disable the firewall at the computer.
— Enable intrusion detection system - select this option to enable the Intrusion Detection System. The Intrusion Detection System (IDS) is used to allow or block network activity based on a defined Intrusion Detection Rule.
• Log port scans - Select the check box to log all attempts at scanning ports over your network. The port scan data will be stored in the log file.
• Log packets going to unopen ports - Select the check box to log data packets going to unopen ports. This data is useful to analyze the attempts to communicate with unopen ports in the network.Click Add to add a new Program Rule. Specify or select the options and click OK. The following parameters are displayed:
— Name - name of the rule.
— Program - name of the program, including full path and extension.
—
—
—
— Network Rules define the action taken by the firewall on the network activity. Click Add to add a new Network Rule. Specify or select the options and click OK. The following parameters are displayed:
— Name - name of the protocol.
— Description - description of the protocol.
—
—
—
— Click Add to add a new Advanced Rule. Specify or select the options and click OK. The following parameters are displayed in the Advanced Rules pane:
— Name - name of the rule.
— Program - name of the program and path.
— Action - the action taken by the Firewall for communication from the specified application, port or protocol (Allow, Block or Prompt).
—
— Protocol - the name of the protocol.
— Local Port - details of the local port.
— Remote Port - details of the remote port.The Intrusion Detection System (IDS) is used to allow or block network activity based on a defined Intrusion Detection Rule. Specify the action (Allow or Block) in the Intrusion Detection Rules pane for each rule that is categorized as High, Medium or Low priority on this screen. Click Edit to edit or Delete to delete a pre-existing rule.Click Add to add a new Intrusion Detection Rule. Specify or select the options and click OK. The following parameters are displayed when you click Add:
— Enabled - select if this rule is to be enabled.
—
— Category - select the category (such as bad-unknown, attempted-admin, attempted-dos, or attempted-recon).
— Snort Rule- specify the snort rule. For more information on Snort rules, visit www.snort.org/snort/faq.Click Add to add a new Trusted Zone. Specify or select the options and click OK. The following parameters are displayed:
— Name - name of the Trusted Zone.
— Description - description of the Trusted Zone.
—
• Enable Process protection- select this option to enable process protection. This feature is used to set the action for unknown code injectors and to add your own allowed code injectors based on the settings in the Process Protection pane.
• Enable boot time protection- select this option to enable boot time protection. Boot time protection protects your computer when it starts, blocking traffic from occurring before Windows has a chance to open.Code Injection - select Allow or Block.Click Add to add a new Code Injector. Specify or select the options and click OK. The following parameters are displayed:
— Injector name- specify the name of the injector.
— Program path- browse to select the program.