Settings Firewall

Written By Marissa Fegan (Super Administrator)

Updated at September 5th, 2025

Table of Contents

You can manage the , Web Filtering, and Process Protection settings.

Access the by clicking Manage, then Firewall.

Caution: Modify your Firewall settings with care, especially when creating exceptions. But, at any time you feel you set something wrong and don't know how to fix it, you can Reset to Firewall Defaults.

 
  • Firewall Protection: The Firewall is enabled by default and includes Exceptions, Networks, IDS, and packet logging. It is recommended to have the Firewall enabled at all times.
  • Intrusion Detection Systems (IDS): Select to activate the IDS rules engine. Click IDS Settings to enable/disable and modify actions of the IDS rules.
  •  Log events: Select to enable logging of firewall events to the Firewall History. Click Customize to choose which types of events are logged:
    • Application Rules - Logs application events that were generated based on the application exceptions (rules).
    • Port Rules - Logs port events that were generated based on user-defined port exceptions (rules).
    • Communication Rules - Logs network events that were generated based on the network exceptions (rules).
    • Advanced Rules - Logs events that were generated based on user-defined advanced exceptions (rules).
    • Packets Going To Unopened Ports - Logs events where packets were sent to unopened ports (PUP).

      Note: Log events is OFF by default. Enabling Log events may impact system performance.

       
  • Stealth Mode: Malicious users can attempt to exploit vulnerabilities by scanning your computer's ports and checking for specific message types (specifically, ICMP unreachable and TCP reset messages). Stealth Mode blocks these outgoing ICMP unreachable and TCP reset messages for a port when no application is listening on that port. Automated scans looking for these responses will receive no information when Stealth Mode is enabled.
  • Boot Time Protection: Boot time protection protects your computer when it starts, blocking traffic from occurring before Windows has a chance to open. Firewall Protection must be selected for boot time protection to be enabled. This option is enabled by default. Disabling it is useful for testing and troubleshooting (for example, to solve problems with remote host administration). For security reasons, it is recommended that you do not disable this option unless necessary.
  • Manage Rules: Click to open the Exceptions dialog where you can manage rules spending on your OS, Services, ApplicationsPortsCommunication, and Gateway exceptions.
  • Manage Networks: Click to open the Networks where you can manage Trusted Networks, and Public Networks.
  • Manage Intrusion Rules: Click to open the Intrusion Detection Systems dialog where you can modify an Action to intrusions based on priority, and enable/disable specific IDS rules.

Process Protection

  • Host Intrusion Prevention System (HIPS): Switch on to activate HIPS and any code injection exceptions that you may have added.
  • Action: Select an action from the drop-down list for HIPS to perform.
  • Manage HIPS: Click to open the Host Intrusion Protection System Exceptions where you can manage the code injection exceptions. You can add exceptions for applications that you want to be allowed to code inject. Some non-malicious programs use code injection.

  • Reset to Defaults: Click to reset to the defaults if you suspect that something that you changed in the Firewall is causing problems. For more information, see Resetting to Firewall Defaults.