Basic Steps for Configuring the Firewall

See also:

 

This topic provides an overview of how to configure firewall settings.

1. Zone Security: Control specific computers, networks, and Web sites

Using Zones, you can grant trusted computers, networks, and Web sites (Trusted Zone) a level of access different from the access for locations you don't trust or know (Internet Zone). Zone security controls which ports are open and more.

To follow are the different security controls that can be applied to a Zone. After each description is the tab name of where the settings reside.

For the preset security levels, the following settings are fixed. For the Custom level, you can change these settings.  

There are two components to setting Zone security (click a link for detailed instruction):

 

See Zone Security – Overview for more information.

2. Program Policies and IntelliDefense: Control specific programs/applications within a Zone

Program Policies and IntelliDefense work together to control the communication of programs/applications with a given Zone. One program can have different permissions depending on whether a Trusted Zone or an Internet Zone location is involved.

 

Additionally, if you don't want to see prompts, you can select Do not show prompts - automatically use default program permissions on the Settings window to have all generated prompts automatically answered by the firewall, rather than requiring an answer from you.

 

See Overview of Program Controls for more information.

3. Change Defaults: Change other features for the firewall on the Settings window.

The settings on the Settings window apply to the entire firewall and are not Zone-specific. Some of the functions you can do on this window:

 

See Settings Window for more information.

Related topics:

Basic Steps for Using the Firewall

Flowchart of iolo Personal Firewall process