ESET SMART SECURITY User's Guide Page 42

  • Download
  • Add to my manuals
  • Print
  • Page
    / 120
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 41
42
Notify about learning mode expiration in X days Specifies the number of days after which ESET Smart Security will
notify the user that Learning mode is still active. This option is intended to prevent the user from operating the
Personal firewall in Learning mode for an extended period of time. We recommend switching the Personal firewall
to Learning mode only for a short time, while the user initiates typical connections. Network communications which
are saved during the Learning mode period can be used as the foundation for a permanent set of rules.
4.2.2 Firewall profiles
Profiles can be used to control the behavior of the ESET Smart Security Personal firewall. When creating or editing a
Personal firewall rule, you can assign it to a specific profile or have it apply to every profile. When you select a
profile, only the global rules (rules with no profile specified) and the rules that have been assigned to that profile
are applied. You can create multiple profiles with different rules assigned to easily alter the Personal firewall
behavior.
Click Profiles... (see figure in section Filtering modes) to open the Firewall profiles window where you can Add, Edit
or Remove profiles. Note that in order to Edit or Remove a profile, it must not be selected from the Selected profile
drop-down menu. When adding or editing a profile, you can also define the conditions that trigger it.
When creating a profile, you can select events that will trigger the profile. The following options are available:
Do not switch automatically The automatic trigger is turned off (the profile must be activated manually).
When the automatic profile becomes invalid and no other profile is activated automatically (default profile)
When the automatic profile becomes invalid (ie. if the computer is connected to an untrusted network – see
section Network authentication) and another profile is not activated in its place (the computer is not connected to
another trusted network), the Personal firewall will switch to this profile. Only one profile can use this trigger.
If this zone is authenticated This profile will be triggered when the specified zone is authenticated (see section
Network authentication).
When the Personal firewall switches to another profile, a notification will appear in the lower right corner by the
system clock.
4.2.3 Configuring and using rules
Rules represent a set of conditions used to meaningfully test all network connections and all actions assigned to
these conditions. Using Personal firewall rules, you can define the action that is taken when different types of
network connections are established. To access the rule filtering setup, navigate to Advanced setup (F5) > Network
> Personal firewall > Rules and zones.
Click Setup... in the Trusted zone section to display the Trusted zone setup window. Do not display dialog with
Trusted zone settings... allows the user to disable the trusted zone setup window each time the presence of a new
subnet is detected. The currently specified zone configuration is automatically used.
NOTE: If the Personal firewall is set to Automatic mode, some settings are not available.
Click Setup... in the Zone and rule editor section to display the Zone setup window, where an overview of either
rules or zones is displayed (based on the currently selected tab). The window is divided into two sections. The
upper section lists all rules in a shortened view. The lower section displays details about the rule currently selected
in the upper section. The bottom of the window has New, Edit, and Delete (Del) buttons, which allow you to
configure rules.
Connections can be divided into incoming and outgoing connections. Incoming connections are initiated by a
remote computer attempting to establish a connection with the local system. Outgoing connections work in the
opposite way – the local system contacts a remote computer.
If a new unknown communication is detected, you must carefully consider whether to allow or deny it. Unsolicited,
unsecured or unknown connections pose a security risk to the system. If such a connection is established, we
recommend that you pay particular attention to the remote computer and the application attempting to connect to
your computer. Many infiltrations try to obtain and send private data, or download other malicious applications to
host workstations. The Personal firewall allows you to detect and terminate such connections.
Page view 41
1 2 ... 37 38 39 40 41 42 43 44 45 46 47 ... 119 120

Comments to this Manuals

No comments