• Enable Firewall Protection - select the check box to enable Firewall Protection. Firewall Protection prevents hackers or malicious software from gaining access to your computer through the Internet or the network.
— Allow users to disable firewall - select this option to allow users to disable the firewall at the computer.
• Enable Firewall Logging - select this option to log all actions related to the Firewall.Click Add to add a new Program Rule. Specify or select the options and click OK. The following parameters are displayed:
— Name - name of the rule.
— Program - name of the program, including full path and extension.
—
—
—
—
Click Add to add a new Advanced Rule. Specify or select the options and click OK. The following parameters are displayed in the Advanced Rules pane:
— Name - name of the rule.
— Program - name of the program and path.
— Action - the action taken by the Firewall for communication from the specified application, port or protocol (Allow, Block or Prompt).
—
— Protocol - the name of the protocol.
— Local Port - details of the local port.
— Remote Port - details of the remote port.Click Add to add a new Trusted Zone. Specify or select the options and click OK. The following parameters are displayed:
— Name - name of the Trusted Zone.
— Description - description of the Trusted Zone.
—
• Enable Process protection - select this option to enable process protection. This feature is used to set the action for unknown code injectors and to add your own allowed code injectors based on the settings in the Process Protection pane.
• Enable boot time protection - select this option to enable boot time protection. Boot time protection protects your computer when it starts, blocking traffic from occurring before Windows has a chance to open.