Setting up rules for Agnitum Outpost Firewall. A small overview of Outpost Firewall Pro Introductory description of features

I have long wanted to place this well-known program responsible for the security of your computer. So, in front of you is a professional firewall, with its help you can protect the system, and hence its users, by applying filtering of both incoming and outgoing network traffic, download Agnitum Outpost Firewall possible from our project.

The product is perfectly capable of monitoring the current connection, it is also able to detect suspicious activities. If you want to completely protect yourself from everything that is written above, then you need to use professional products, such as Agnitum Outpost Firewall, which is what we are talking about. The program is able to use a multi-level approach to problems, you will get excellent proactive protection, it will be based on behavior analysis.

I would like to note the convenient user interface Agnitum Outpost Firewall, there is Russian support, which of course should please us users. At the first start, the wizard will be opened, there you will need to specify some parameters, you can just wait until the product analyzes and configures everything by itself. After Agnitum Outpost Firewall will work in learning mode, you will have to answer some questions of the program yourself, for example, is this or that connection safe, after that rules will be created and, as a result, the firewall will be successfully trained.

Release name: Agnitum.Outpost.Firewall.Pro.9.3.4934.708.2079
Developer: Agnitum Ltd
License: shareware
Language: Multi + Russian
Size: 35.26 & 42.86 MB
OS: Windows
Download.

I think that the problem of security worries every computer user. And if everything is more or less clear with such a nuisance as viruses and Trojans, then with direct attacks on the system, things are much more complicated. To avoid encroachment on information dear to the heart, it is necessary to install the so-called FireWall. The principle of operation of any firewall is based on the complete control of all services and programs that need access to the World Wide Web or local network.
Correctly setting up such a “shield” is not an easy task. Developers understand this and often make a simple and intuitive interface with a minimum of visible program settings. This approach is also used in Agnitum Outpost Firewall. However, automatic configuration is not always suitable for a given user. And here, many are faced with the problem of creating a rule for a particular program.

All tests were performed with Agnitum Outpost Firewall ver. 3.5. But many settings will be present in earlier versions of this product. If something is not indicated in the article, it is better not to touch it and leave it as it is.
So, let's begin.

Installation does not cause any problems. They will ask you to reboot - we agree.
Next comes the creation of an automatic configuration - create.
Immediately go to “Settings - System - Global rules and raw socket access”. Click the "Settings" tab and see all the global rules that apply to all programs and services on the network.

Allow DNS Resolving. Without this rule, networking will be impossible, as access to the DNS server will be blocked.
. Allow Outgoing DHCP. This rule allows the use of DHCP. If your provider uses DHCP, then leave it, if not, feel free to disable it.
. Allow Inbound Identification. I recommend turning it off. For most users, receiving incoming data on port 113 for identification is useless.
. Allow Loopback. Make loopback connections, which are more commonly referred to as “closing back”. If you use such a connection, then the checkbox should be left, if not, feel free to disable it.
. Allow GRE protocol. Necessary for everyone who uses PPTP (VPN access organization). If you do not use such a connection, then disable it. If in doubt, contact your ISP.
. Block Remote Procedure Call. Remote procedure call blocking. Most users don't need a remote procedure call at all. But such a right will certainly come in handy for any bad users. We leave a checkmark.
. Deny Unknown Protocols. This rule allows you to block any connection if the protocol type cannot be determined. Leave the bird.

All other rules allow you to work correctly with the TCP and UDP protocols, so we leave everything as it is.

Here we can completely close access to a specific port of the system. How to do it? Everything is quite simple.

1. Select “Add” to create a new system/general rule.
Next, a window will open with options (options) for setting general / system rules.

2. Select an event for the rule, label “Where Protocol”, “Where Direction” and “Where Local Port”.

3. In the “Rule description” field, click on “Not defined” in the “Where protocol” line and select the required protocol.

4. In the “Rule description” field, click on “Undefined” in the “Where direction” line and select the “Incoming” connection.

5. In the “Rule description” field, click on “Not defined” in the line “Where is the local port” and indicate the port number you want to close.

6. In the “Select actions” field for the rule, check “Block this data” and mark the rule as “High priority rule” and “Ignore Component Control”.

7. In the Rule Name field, enter a name for the rule and click OK to save it. The name of the rule should appear in the Options list.

I strongly recommend creating rules to completely block incoming traffic on UDP ports 135, 137, 138 and TCP ports 135, 139,445. You can safely block port 5000 for both incoming and outgoing connections (this is Universal Plug & Play) You can also close 5554 and 9996 via TCP. It is through these ports that attacks on your computer most often occur.
Next, go to the “Applications” tab and remove all programs from there. Why do we need it? Now I will try to explain. An ordinary user needs only a few programs to work: a browser, a download manager, a mail program, an ftp client, ICQ. The rest will wait...

We set the policy "Training", enter the Internet and launch each of them. Outpost will ask you to create a rule for each program, which we do. Then we edit each rule separately.

For the Opera browser, the Outpost developers allowed the following connections: outgoing for the TCP protocol on ports 21.25, 80-83, 110, 119, 135, 443, 1080, 3128, 8080,8081, 8088. Quite a lot, isn't it? Let's figure out what we need from the browser (The analogy with IE and Mozilla will be almost complete). We block the 21st port (Opera FTP connection) first of all, however, if you download files from ftp servers using a browser, you should leave a checkmark. Ports 80-83 are responsible for working over the HTTP protocol. We don't touch them. The 25th (Opera SMTP connection) and 110th (Opera POP3 connection) ports are responsible for sending and receiving mail, respectively. If you do not use a third-party mail program, then leave it; if not, feel free to uncheck the box. News is received on port 119 via the NNTP protocol, if you do not receive news in this way, then the port can be safely closed. The 135th should be blocked. The 443rd port is responsible for connections via the HTTPS protocol, which is more commonly referred to as SSL, which is used to organize a cryptographically secure channel for exchanging data (passwords, keys, personal information) on the network. I think it's best to leave it unchanged. Port 1080 is responsible for SOCKS connections. If you do not use SOCKS servers at work, the port can be safely disabled. 3128, 8080,8081, 8088 - these are all ports for working with proxy servers: use them - leave them.

Outlook works with outgoing TCP connections on ports 25. 80-83,119, 110,143,389,443.995,1080. 3128. 8080. 8088. We do not touch the 25th and 110th - they are responsible for performing the main function. We have already dealt with the 119th port. Port number 995 - receiving mail via the POP3 protocol using a secure SSL/TLS connection. If you do not need it, then we close the 995th port. The 143rd port is responsible for working with mail via the IMAP protocol. No IMAP - the port is closed. Through port 389, you can access the LDAP server. At home, it is unlikely to be useful. So, we are closing. The Bat! uses almost the same ports as Outlook, except for the ports required by PROXY.

The rules for download managers should not be changed. They use only the necessary ports, but if you do not use a proxy, you can safely block all the same ports 3128.8080.8088.
For the ftp client, only port 21 should be left.

It is necessary to pay attention to some utility programs.
. Alg.exe - Microsoft Application Layer Gateway Service. This process provides support for Internet Connection Sharing / Internet Connection Firewall plugins. These services allow multiple computers on a network to connect to the Internet through a single computer. In most cases, it is not needed.
. Conf.exe is Net-Meeting. Not needed - disable.
. Dwwin.exe - Microsoft Application Error Reporting. Clear without words!
. Mstsc.exe - Microsoft Remote Desktop. Remote Desktop Connection.
. explorer.exe- Microsoft Windows explorer. What does Internet Explorer need?
. Lsass.exe - Local Security Authority Service. This is the local authentication server that spawns the process responsible for authenticating users against the Winlogon service.
. Messenger service that forwards administrative messages between clients and servers. By and large, the home user does not need it.

  1. Hello admin, please explain why you need operating system firewall, what functions does it perform? I have installed on my laptop, which I installed according to your article. I have no complaints about the work of the antivirus, but the only thing that confuses me is the firewall that is disabled in the free version of Panda. My friends also ask me - Does my antivirus have a firewall? Well, I don't even know what that is. If I need it, where can I download it and how can I install it?
  2. Salute to everyone! Question - I use ESET NOD32 Smart Security 7 antivirus, which has its own firewall. Should I install the world's best firewall, Outpost Firewall Pro, as a second firewall to enhance Windows protection?

Administrator Note A: To protect your computer from viruses, spyware and other malware, your computer must have both an antivirus and a firewall, also known as a firewall. And if the basic functions of the first are known to many, then not everyone knows about the role of the firewall.

Why does a computer need a firewall?

Firewall, aka firewall is a special program that protects against a certain type of malware that aims to gain access to a computer via the Internet or via local network. As a rule, these are network worms and hacker attacks. To do this, the firewall checks the data coming from the Internet or via the local network, then decides whether to block this data or allow it to be transferred to the computer.

  • Friends, you ask why you need a firewall! Look at any anti-virus program, this is no longer one program (as it was recently), but several powerful tools combined into one with multi-level protection, and even with cloud technologies: HIPS (proactive defense), advanced heuristics, firewall, protection against phishing and vulnerabilities, anti-spam, parental control and God knows what else will be added soon. All this is forced by the dangers that await us on the Internet, and the very first blow is taken by none other than our firewall!

Windows OS, starting with version XP SP2, is equipped with a regular firewall, it is called "Windows Firewall". But before Microsoft implemented this functionality, a computer could easily become infected with a network worm, even though an antivirus was installed on the system.

The fact is that an antivirus is a diagnostician and a healer, it can detect the presence of malware in the computer and cure the system by isolating the infected files. Alas, the antivirus cannot protect against the recurrence of the disease - from the re-penetration of malware. But the firewall can do it. The only “but” is that the firewall cannot protect the user when he himself opens access to his data on a home or corporate network.

As is the case with many regular Windows programs and services, the problem with the minimalism of their settings and functionality is solved by third-party developers, but already in their software products. And the standard Windows firewall can be changed to any third-party one. Unlike the regular Windows firewall, which runs in the background and protects against network threats “silently” without informing the user about it, most third-party firewall programs will report almost every step of theirs with software notifications. Naturally, this is not the main advantage of third-party firewalls over the standard Windows firewall. The advantage lies in the possibility of flexible security settings - from basic protection to enhanced protection, where almost every action on the computer will require user permission.

  • As in the case of antiviruses, only one firewall should work on the computer - either a standard one or a third-party one - so that there is no software conflict. When installing a third-party firewall, the regular Windows firewall is disabled automatically.
  • Firewall Outpost Firewall Pro is friendly with a large number of antiviruses and you can install it to help free antivirus programs:, but it makes no sense to install it to help such antivirus monsters as Kaspersky Internet Security, since they have their own powerful firewall.

Why choose Outpost Firewall Pro?

Outpost Firewall Pro is a comprehensive, complete protection for the Internet. The program monitors network traffic - both incoming and outgoing - in order to detect network threats and prevent leakage of user data from the computer. Outpost Firewall Pro monitors the behavior of programs installed on the computer, blocking the launch of suspicious processes.

Outpost Firewall Pro has, in fact, the same functionality as many antiviruses. While rare antiviruses have an advanced firewall in their composition. The antivirus functionality in Outpost Firewall Pro is called proactive protection. Proactive Defense blocks the launch of Trojans, spyware, and other malware.

Some antivirus products have convinced users that any security software is necessarily a powerful system resource eater. This is not the case with Outpost Firewall Pro. The program consumes system resources economically and will not slow down the system on low-powered computer devices.

Outpost Firewall Pro, like anti-virus products, will automatically load at system startup and protect your computer all the time.

You can download the trial version of Outpost Firewall Pro, which can be used for 30 days for free, on the developer's website:

Consider more detailed installation, configuration and functionality of Outpost Firewall Pro.

Installing Outpost Firewall Pro

Download the installation file of the program and run it.

In the language selection window, Russian is preinstalled, click "OK".

You will be greeted by the program installation wizard.

In the next window, you must agree to the license agreement.

If you already have anti-virus software installed on your computer, in the next window you will see that Outpost Firewall Pro takes care that no program conflicts occur.

Note: Avira antivirus will not work with Outpost Firewall Pro and they will not work together, but I want to say that it gets along well with Avira antivirus.

Having got rid of the antivirus, at this stage of the installation of Outpost Firewall Pro, we will see that the wizard offers us a choice of normal and custom installation. Let's choose the usual one, it will be enough to protect against the most dangerous methods of malware penetration into the computer. However, any of the preset parameters can later be changed in the program settings.

The program will install.

And it will ask you to restart your computer.

After restarting the computer, we will see the program icon in the system tray, and double-clicking on it will open the program window. Basic information will be presented here - working protection components, the time of the last update, how many days you can use the free trial version, etc.

You will feel the full operation of the program only after launching the programs installed on your computer. Outpost Firewall Pro will paranoidly recognize almost all third-party programs as suspicious and ask you for permission to run them. Fortunately, you will need to allow the launch of programs only once for each. In the future, Outpost Firewall Pro will remember the permission for each of them as a rule for execution. This is the so-called auto-learning mode of the program - it learns from you to trust certain programs that you run on your computer.

It's better to be safe than sorry - that's probably what the developers of Outpost Firewall Pro thought, because the firewall will detect even your attempt to switch to the full-screen mode of the program and ask if you want to be protected as part of the full-screen work of the software.

Overview of individual functionality

Let's see what functionality is provided in Outpost Firewall Pro.

The Firewall tab displays data on active processes - the number of open connections, as well as the amount of received and sent data.

Double-clicking on an active process will open a window where you can more flexibly configure the behavior of the firewall in relation to this process.

In the "Tools" tab, you can view information on blocked attacks, on the ports involved, on running applications that use an Internet connection, etc.

In the "Update" tab, you can manually start, respectively, updating the program, if necessary.

Help on how to work with the program, and the option to resolve the issue with the license are in the "Help" tab. Here you can also follow the link to the official website of the program, which provides information on creating a boot disk (Live Disk) with software from the developer company Agnitum.

Let's look at the Outpost Firewall Pro settings using the example of setting parameters for enhanced computer protection.

Outpost Firewall Pro Settings

Go to the "Settings" tab of the program and click on the "Advanced Settings" link.

A window with advanced settings for Outpost Firewall Pro will open. Let's start from the very beginning - with the "General" section.

In the "Configuration" subsection, you can protect Outpost Firewall Pro from being disabled by hackers and network worms with a password.

If you do not want to provide the developer with information about what programs you use and what threats have been detected on your computer, you can opt out of this preset option in the "ImproveNet" subsection. Here you can also refuse to send suspicious files to the developer or set up automatic sending if you do not want Outpost Firewall Pro to constantly pull you and ask about it.

In the "Protection of the system and software" subsection, the protection of the system and applications is activated by default, so let's immediately move on to the subsection "Protection of folders and files". Here, accordingly, you can set the option to protect those files and folders that you especially value. Access to these folders will be denied to other users of the computer and, of course, to malware.

In the "Protection of removable devices" subsection, you can, on the contrary, remove the blocking of application launches if, for example, you often launch programs and games from removable media - a flash drive or an external HDD.

Unfortunately, not every antivirus is compatible with Outpost Firewall Pro. True, the presence of such a separate software product is rather a tribute to the habit that people have developed over the years. The proactive protection functionality and flexible settings of Outpost Firewall Pro will make your computer immune from threats from the network. Threats will be prevented, and not constantly sought out and treated by antiviruses. You can periodically scan the system using free antivirus utilities - for example, or

However, it is recommended to do this with the healing utilities of another anti-virus product even if an anti-virus is installed in the system - so, for greater vigilance.

In this situation, the owners of low-power computers will certainly feel the potential of the released system resources, because the antivirus will not devour them.

In December 2015, Yandex acquired technology from Agnitum. These technologies will be used to protect Yandex.Browser users. As a result of the agreements reached, Agnitum ceases direct and partner sales of the Outpost product line. Updating anti-virus databases, fixing errors and technical support will be carried out until December 31, 2016.

The opinion must be said not the worst, but rather peculiar.
In general, let's go.

Introductory Description of Features

Actually, the products of the outpost line, according to the developer, are represented by the following three types of configurations (I do not take office options into account):

  • Outpost Firewall FREE (English only)- provides basic protection for those who work on the network irregularly and for a very limited time.
  • Outpost Firewall PRO - provides excellent protection against unauthorized access to your computer and leakage of confidential data.
  • Outpost Security Suite Pro - provides 100% computer protection. It includes all the necessary : , spam filter, proactive protection.

I rejected the Free version option as not interesting due to, theoretically, cut-down functionality and, to be honest, the absence of . In the future, I will dig into this assembly and tell you about it (most likely in the upcoming FireWall test), but so far something has not grown together somehow :)

Security Suite Pro, in my opinion, is too stuffed with all sorts of differences, and by nature I do not recognize attempts to push an iron + refrigerator + hair dryer + washing machine into a ballpoint pen, because in practice, at best, nothing works, and at worst Everything works, but it's so crooked and slow that you want to howl. Therefore, I considered such a .. product not appropriate even for testing. Moreover, demolish installed antivirus somehow I didn’t want to because it was also at the testing stage and was installed in the system quite recently.

Well, it remains, of course, Outpost Firewall PRO, which, in fact, was installed by me on the unfortunate x64 system that I have been trying lately.

Why You Shouldn't Choose All-in-One Versions

I must say that this very PRO version is also crammed with a lot of all sorts of differences, but, as is usually the case with "one hundred in one" products, firstly, not all of them are needed, and secondly, these functions work far not as good as they work in analogue programs (so to speak, "one in one") in which the primary goal is to perform just these (and only these) functions.

The first thing I immediately disabled was web control. The thing, firstly, is implemented stupidly, i.e. without proper setup, she rested her legs and completely refused to let me even in (by the way, without arguing this by the way), and, secondly, it is absolutely not clear why she is in the firewall at all, if all that she can do (cut ads, block Java, etc. and so on) has long been implemented and screwed into the mozilla with a number of adequate or even settings based on the browser core. In general, web control turned out to be some kind of stupid, for which he was punished :)

Following web control, oddly enough, such a thing as local security went to rest, which, according to the developer (and logically), monitors changes in applications, system resources and blocks attempts to launch malicious programs directly or by intercepting other applications . It sounds nice, but the thing is wildly annoying, constantly pestering with its cries about every sneeze of each program, and plus, even after proper configuration, it’s still, in my opinion, useless (except in a number of completely neglected cases or on servers (and even then not a fact)) and pretty sitting on the resources of the system.

Description of opportunities and reasoning on the topic

Nothing more, ahem, superfluous in the course of communication with the program could not be found, and therefore now about the most important thing, i.e. about the firewall itself, its core and other joys of this miracle.

The first and most important thing that I liked the most was the information content. I love it when everything is competently, in detail and clearly laid out on the shelves and, as a result, accessible, understandable and manageable. This is where happiness happened, because of something, but the information content of the outpost "does not occupy - everything is here, from the name of the process to the port and traffic. See for yourself:


Such chewed and detailed information cannot but rejoice, because with the help of all the data provided, you can configure network security in the most appropriate way.

The second thing I liked and what is important is security in terms of repelling attacks, and in general it is on top. For all the time of use, only one attack slipped past the firewall, and it’s not entirely a fact that it slipped through, maybe I overlooked something. The firewall registers all types of attacks known (at least to me), and, what I like, it can cut off banal requests on the local network, thereby reducing the load on it. The only thing I didn’t understand was how the firewall blocked the address of the attacking computer, because it did it very rarely, which, however, is not very important, given that the attack was successfully repelled. All this time I have been monitoring the operation of the firewall using APS and tracking logs on . Speaking of the router, the firewall in its firmware, as it turned out, periodically missed a number of attacks (unless, of course, outpost does not lie and imitate active work, as one well-known network security complex did in my practice). Oh yes, I was also pleased with the work with and filtering the port on which, in fact, the torrent was spinning - everything superfluous is cut off and only connections of the proper type are skipped. Very, very good.

The same, i.e. the same quality of work also applies to the firewall surveillance of the access of applications on the computer to the Internet, namely, everything is implemented clearly, competently, adequately. It is possible to fine-tune and flexible settings for the work of programs with the network, both down to the smallest detail (port, protocol, etc.) and on the basis of common platitudes such as deny / allow all activity to a particular application (such things greatly simplify the firewall setup for beginners). It is possible to create general rules for applications. There is a learning mode. In short it's great :)

In general, the implementation of these two things, i.e. detection\repelling attacks and controlling access of applications to the Internet is really good and adequate, and these are the main, in my opinion, the parameters of the firewall. For avid players, by the way, there is a detection of the moment when full-screen applications are launched and the firewall switches to the so-called game mode, when the program stops pestering the user with questions, self-learning / other joys and goes into silent blocking of external intrusions.

By the way, the firewall has a protection module, which, according to experience, is sometimes vital / useful, as well as the possibility of a hidden mode of operation (which, in general, is also part of the firewall's self-defense). I can’t say how adequately these moments work, because serious hacker attacks didn't order :)

In general .. the thing is quite pleasant to use, quickly learnable and, I would say, user-friendly. Yes, not without minor flaws and oddities, but still there is friendliness, especially since there is very adequate support for the Russian language.

I'll tell you a secret that I have some doubts about the speed of such happiness on an x32 system and weak machines (the test configuration on which I tested this firewall and ). Especially performance can get hooked if someone decides to still use local security and web control, because all the same, this firewall thing is quite heavy in itself, and even in the complex .. Although I won’t say it because everything works smartly for me, smoothly and comfortably.

Afterword

To the question whether to put it or not, I will answer yes, but in general, despite the fact that the overall impression is quite pleasant, I still have some kind of feeling of the program’s cumbersomeness and overstuffing, and therefore, it is possible that free version, where only a firewall, in terms of a home solution, will be a much more competent and adequate choice, because the pro version, in my opinion, is still closer to the server version than to the home one, and closer, I think, both in terms of the number of settings and the number of functions .. And the last - the price .. She still bites.

That's probably all.

This is what I have, please note, a completely independent opinion ..

However, an opinion is an opinion, but it's up to you to decide, as usual;)

Configuring Outpost Firewall Pro

Outpost Firewall Pro settings can be accessed by clicking the button of the same name. The main settings items are the same as the names in the main program window (Fig. 4.6).

Rice. 4.6. Outpost Firewall Pro settings window

Consider the most commonly used settings and those that may be needed at the initial stage of work.

On the menu General the interface language, download mode and game mode resolution are selected, in which the firewall does not bother the user with messages. Checking the boxes activates SmartScan technology and internal firewall protection. By going to the submenu Configuration, you can protect the settings with a password, save and restore the configuration. The update schedule is indicated in subparagraph Update. Once installed, updates are checked hourly. This can be changed if necessary.

On the menu Firewall the firewall operation mode is configured in normal, background and game mode. When installing Outpost Firewall Pro, it analyzes network settings, and local networks that are safe from its point of view are entered in the sub-item LAN Settings. By default, any communication with such networks is allowed. If necessary, here you can change the list of trusted networks, individual IP addresses and domains. Checking the checkbox Fiduciary opposite the address will allow all connections; To allow connections to shared files or directories via the NetBIOS protocol, select the checkbox of the same name. Module Attack detector, whose settings are located in the corresponding menu (Fig. 4.7), adds functions that are usually not characteristic of classic firewalls: detecting and preventing computer attacks from the local network and the Internet. The module scans incoming data for signatures of known attacks, and analyzes scanning attempts, Denial of Service (DoS) attacks, and other, including unknown, network attacks.

Rice. 4.7. Attack Detector module settings

Advice

If a network system for detecting and repelling attacks is installed on the computer, the Attack Detector module should be disabled by clearing the corresponding checkbox.

In field Alarm level the alarm level and the module's actions when an attack is detected are configured. Using the slider, you can select one of three alarm levels: Short, Optimal And Maximum, which differ in their response to some benign types of attacks. The latter provides the highest level of protection, but will generate a large number of warnings. Pushing a button Setting, you can specify which types of attacks should be detected and prevented by Outpost Firewall. On the tab ethernet configurable protection against some attacks specific to Ethernet and WiFi networks. In particular, here you should enable ARP filtering, which allows you to protect yourself from IP address spoofing by an attacker. In the region of Ethernet attacks the reaction of the module to such attacks is configured. On the tab Additionally you can edit the list of attacks that the module should detect and prevent. Each attack has a brief description, but disabling anything is only recommended if you know exactly what you're doing. Pushing a button Vulnerable ports, you can specify all the port numbers that you want to pay special attention to. Here you can enter port numbers traditionally used by Trojans and programs remote control computer. Checking the checkbox Block the attacker for … minutes allows you to set the period of time for which the IP address of the attacking host will be blocked, i.e. no one will be able to connect to the protected computer from this address. Additional checkbox Block the attacker's subnet allows you to insure yourself in case an attacker wants to change the IP address (for example, when reconnecting via a modem connection, you can get a different IP address). To receive alerts when attacks are detected, check the boxes Play a sound alert when attacks are detected And Show visual alert when attacks are detected. In order for trusted hosts not to be blocked by the attack detector, they should be specified in the field Exceptions- all packets sent by them will not be considered malicious.

Module setup Local Security similar to the one described above. Using the slider, depending on the nature of the current work, one of four security levels is set - from Short, in which only network access requests from modified executable files are controlled, up to Maximum, the activation of which enables maximum system protection. Pushing a button Setting, you can specify which actions, events, and components this module should monitor. You should only use this option if you encounter problems or if you know exactly what you want to achieve. In most cases, it is more convenient to use the slider Security level. Applications that can be called by other programs can be listed Notable applications, and set up control rules individually in the list Anti-Leak Control Exceptions. To do this, click the button of the same name and specify the path to the executable file. Module Local Security will not control their actions and bother the user with requests.

On the tab Antispy enable or disable the spyware control module and configure alerts and exclusions. Checking the checkbox Check for spyware on program startup will allow scanning of all running programs after starting Outpost Firewall Pro. If the check loads the system, you can check the box Run specified jobs with low priority. In subparagraph Profiles and schedule profiles of system checks and tasks for automatic check at the specified time are configured. When setting up a scan profile, you can specify which system objects and partitions hard drive should be checked as well as checking certain types of files and archives. With drop down list Select an action the default action for detected malicious objects is set. Checking the checkbox Skip files larger than: ... Mb allows you to set the maximum size of scanned files. On the tab Mail Scanner the mode of checking attachments in e-mails is configured. If mail is already being scanned by an anti-virus program, you can disable such scanning by checking the checkbox. Disable attachment filter. The remaining items allow you to rename attachments with the specified extensions or place them in quarantine.

tab Web control contains the settings of the module of the same name. Use the slider to select the level of web control. At the lowest Lightweight only keyword ads are blocked, interactive elements are allowed. Although interactive elements were originally designed to simplify user interaction, they can be exploited by hackers. When setting the level Optimal some dangerous interactive elements are blocked. Pushing a button Setting, you can specify which specific elements to block or allow: ActiveX and Visual Basic scripts, Java applications and scripts, Cookies, pop-ups, external interactive elements, hidden frames, animations, and referrers.

Like other information sources, many Internet resources exist thanks to advertising. Some sites abuse banners, which are images of various sizes, which leads to slow loading. In addition, a user with a per-megabyte payment loses valuable traffic. Turning off the display of pictures solves the problem only partially.

Note

It is generally accepted that banners slow down loading due to their size, which sometimes exceeds the size of the information itself, due to which the user downloaded the resource. That's not all: banners are loaded using scripts that generate the address dynamically, but most often from other sites, so in some cases the user has to wait until the site is found and the information that he then sees is determined.

When setting the slider to level Maximum ads can be blocked by size. However, active content is used on many resources today, and without its activation, full-fledged work is impossible. Such sites can be added to the tab Exceptions. On the tab Personal data blocking the transfer of personal data is configured, for example, an attempt to transfer a credit card number. By setting various parameters, you can automatically replace personal information with asterisks or block the transmission of such packets. However, if you work with online stores and other resources that require such information, enter them in the menu Exceptions. You can completely block known malicious sites and configure ad blocking by keywords in the subparagraph Advertising and websites. On the tab By keywords you can specify a list of keywords that match in HTML tags IMG SRC= And AHREF= their download will be blocked. Pushing a button Download or Save, you can download a list received from another computer, or save such a list for later use on other systems. tab To size contains a list of image sizes that match in the HTML tag A the drawing will be locked. To add a banner size that is not in the list, enter its data in the fields Width And Height and press the button Add.

This text is an introductory piece.
Share with friends or save for yourself:

Loading...