Overview of Zone Security Options
Overview of Custom Level Security
IntelliDefense uses threat-assessment technology to control incoming and outgoing communication for programs. (More on IntelliDefense.)
Note: IntelliDefense controls apply to programs that do not have a program policy.
IntelliDefense first checks to see if a program attempting communication is signed by a software publisher you have designated as trusted. You control which publishers are trusted and how programs of trusted publishers are handled.
To control which publishers are trusted; click Manage Trusted Publishers to open the Manage Trusted Publishers window.
To control how a program of a trusted publisher is handled by the firewall:
Select the Allow all incoming communication check box to automatically give the program incoming access; clear the check box to remove this control; IntelliDefense will then apply its classification controls (described in step 2 below).
Select the Allow all outgoing communication check box to automatically give the program outgoing access; clear the check box to remove this control; IntelliDefense will then apply its classification controls (described in step 2 below).
If access is allowed, the communication is complete and the firewall takes no further action. If a check box is cleared and access in a given direction is not controlled, the communication is then processed by IntelliDefense to determine its classification. Based on that classification, iolo Personal Firewall takes the associated action that you specify on this tab, which is one of the following:
Allow. Allow the communication attempt.
Block. Block the communication attempt.
Prompt. Generate a prompt. (More on how the firewall handles generated prompts.)
To follow is a list of each IntelliDefense classification and a description of its purpose.
Program Classification |
Program Classification Description |
Unknown |
Control access for programs and components that are not in the IntelliDefense database. |
System |
Control access for core components of the Windows operating system. |
Necessary |
Control access for safe programs that perform core functionality. |
Optional |
Control access for safe programs, or components of such applications, that may be desired but are not required to perform core functionality. |
Dangerous |
Control access for software that has been identified as malicious and dangerous by iolo's research team. |
|
|
Trusted Publishers |
Control automatic access for programs signed by a publisher you have designated as trusted. Select or clear the Allow all incoming communication and Allow all outgoing communication check boxes as desired. To control which publishers are trusted; click Manage Trusted Publishers to open the Manage Trusted Publishers window. |
If you are in Edit mode, you can turn the IntelliDefense feature on or off. Click Disable to turn it off; click Enable to turn it back on. In any security level, you can turn the feature on and off from the General tab of the Settings window, by selecting or clearing the Enable IntelliDefense check box.
Note: If you're in View mode and want to make changes, go back to the desired Zone in the Zone Security pane and click Edit Settings in the Custom column.
Related topics:
How IntelliDefense works with other program controls