Managing Applications (Normal User)
Previous Topic  Next Topic 

The Applications screen lists all applications configured to access the Internet/Network and the permissions defined for each.

When you Allow a new application via a pop-up, it is automatically added to this screen.


To access this screen, click Applications on the left navigation panel.



For each application, the permissions for Incoming, Outgoing connections and Logging are presented as icons. These permissions may be changed by clicking on the icon and selecting a new action from the menu presented.


Permissions


1. Incoming Connections


There are four different permissions which may be assigned to applications for their Incoming Connections:



Allows all incoming connections. Selecting this option will override the Trusted IP List. This means that regardless of the profile you are in selecting Allow All on this screen will allow all incoming connections for this application.

Blocks all incoming traffic

Allows incoming traffic only if it is originating from the Trusted IP List

Prompts for an action from the user




2. Outgoing Connections


There are three different permissions which may be assigned to applications for their Outgoing Connections:



Allows all outgoing connections

Blocks all outgoing connections

Prompts for an action from the user




3. Logging


Select Yes to enable Logging of the event and No to disable it.



Enables Logging of activity

Disables Logging of activity




Permissions for Whitelisted Applications



The following is the default configuration for Incoming and Outgoing traffic as well as activity logging for Whitelisted applications defined within Firewall Plus:



Type

Default configuration

Incoming connections

Outgoing connections

Logging




Permissions for unknown applications


The following is the default configuration for Incoming and Outgoing traffic as well as activity logging for unknown applications:



Type

Application tries to listen for incoming connections only

Application tries to connect to the Internet

Application tried to connect as well as  listen

Incoming connections

Outgoing connections

Logging




Adding and Removing applications


When you allow or block an application through Firewall Plus' pop-up notification, it is automatically added to the Applications list. You may also add an application manually through the applications screen.

  1. Click the Add icon at the bottom of the page. Browse and select the application you wish to add and click Open. This will add the application to the list.
  2. To remove, select the application and click Remove.


Hide uninstalled applications


Selecting this option will no longer display rules for applications which have been uninstalled.




Enhanced Security Verification


Firewall Plus provides enhanced protection from malicious applications which seek to bypass the firewall (through the control of legitimate applications).


There are several methods by which malicious applications can control  legitimate applications and bypass the firewall:



When Firewall Plus detects an activity that could be used by a malicious application, it will do the following:






Double-Clicking on the application allows you to custom configure the enhanced verification settings for an application:





Set as Local Proxy: Selecting this option will mark the application as a local proxy. Any application which tries to connect to it will be treated as though it is attempting to connect to the Internet.


Modify System and Applications: This action determines what Firewall Plus should do when the selected application attempts to modify the system and/or an application. You may select between Allow, Ask and Block options.


Access Physical Memory: This action determines what Firewall Plus should do when the selected application attempts to access the physical memory. You may select between Allow, Ask and Block options.







Related Topics: