Settings Window

General Tab

Overview of the Settings window

The General tab on the Settings window allows you to enable and disable tools, change default settings for firewall messages, control event logging, control ICMP communication, and more.

 

Unlike other configurations that are Zone-specific, these settings apply across the entire firewall.

 

The following fields display on the General tab; click on a field name to view detailed instruction.

Firewall Settings

Enable firewall

As a default, the Enable firewall check box is selected and the firewall is enabled.

Note: Disabling the firewall makes your computer vulnerable to attack.  

Start firewall when computer starts

As a default, the Start firewall when computer starts check box is selected and iolo Personal Firewall is enabled when you start or restart your computer.

Note: Disabling the firewall makes your computer vulnerable to attack.

Display network activity on homepage

As a default, the Display network activity on homepage check box is selected, and when network activity is enabled, the bars in the Network Activity image indicate the activity of Internet traffic.

Show icon in tray when firewall is active

As a default, the Show icon in tray when firewall is active check box is selected and the iolo Personal Firewall displays in your system tray when the firewall is enabled.

Prompts and Notices

The Display informational firewall notices option control the display of informational notices (such as the Communication Blocked window).

Firewall notices are messages that display to give you information, but do not require a decision like the prompt windows do. See Communication Blocked (Port Closed Notice) for an example of a firewall activity notice.

 

As a default, the Display informational firewall notices check box is selected and these notices display.

Maximum number of notices to display at one time

The Maximum number of notices to display at one time option limits the total number of concurrent notices that can be displayed at once. (Several can show for a single communication attempt.)

If this maximum has been reached and another notice is generated, the oldest notice is closed and the newer one displays.

 

The default value is 25. You can enter from 2 to 50.

The options shown under Action when program access prompts are generated  control the display of the Allow Access? prompts and the usage of default program permissions.

As a default, the Show prompts - only use default program permissions after [X] seconds option is selected and the default time for "X" is 15 seconds.

 

With this option selected, prompts will display. Then if the prompt window is idle  - meaning, you do not hover over the window with your mouse  for 15 seconds, the default program permission will apply.

 

This option will answer prompts that are generated (prompts can be generated in several different ways) and prompts will never display to you.

 

The action taken is either allow or block, depending on the default program permission.

 

Prompts will display.

 

If the window is idle for more than the specified time, the firewall responds using the default program permission, which is either block or allow.  

Note: To change the time from 15 seconds, enter a different value in the field. You can enter from 2 to 33 seconds.  

See Overview of Program Controls for more information on how these options work with other program controls.

Recent Firewall Events

These options control what displays on the Recent Firewall Events window and the Firewall Odometer pane:

Show events for Internet Zone

As a default, the Show events for Internet Zone check box is selected and Internet Zone activity is logged on the Recent Firewall Events window and the Firewall Odometer.

Show events for Trusted Zone

As a default, the Show events for Trusted Zone check box is selected and Trusted Zone activity is logged on the Recent Firewall Events window and the Firewall Odometer.

Show ICMP events

As a default, the Show ICMP events check box is cleared and ICMP activity is not logged on the Recent Firewall Events window or the Firewall Odometer.

 

These options further control what displays of the Recent Firewall Events window:

Keep the last [X] most recent events         Clear All

Click Clear All to remove all the events that are currently displaying on the Recent Firewall Events window.

 

This functions like a "Reset": all the events that currently display are cleared, but moving forward, events will still display.

This option controls how many events display on the Recent Firewall Events window.

The default value is 25. You can enter from 2 to 100.

 

IntelliDefense

These options control IntelliDefense:

Enable IntelliDefense

IntelliDefense classifies a program attempting communication into one of five classifications, then the firewall takes a set action depending on that classification. (More on IntelliDefense).

As a default, the Enable IntelliDefense check box is selected and IntelliDefense is enabled.

Automatically send details about unknown programs to iolo for research

For programs classified as "Unknown" by IntelliDefense, you can have the firewall anonymously send iolo information about the program. The information will be reviewed to keep the database as current as possible.

As a default, the Automatically send details about unknown programs to iolo for research check box is selected and this feature is enabled.

Note: Enabling this feature does not send any personal or identifying information to iolo. All information sent is confidential and used solely for program research by iolo's research team.

ICMP and Stealth

These options controls the access of PINGs and other ICMP messages.

Enable Stealth Mode

As a default, the Enable Stealth Mode check box is selected and Stealth Mode is enabled. To disable Stealth Mode, clear the check box.

 

When Stealth Mode is enabled:

 

When Stealth Mode is disabled:

Allow ICMP communication

The ICMP (Internet Control Message Protocol) sends informational and error messages between hosts that are attempting to communicate.

 

As a default, the Outgoing check box is selected and ICMP outgoing messages are allowed; the Incoming check box is cleared to block incoming messages.

 

When Stealth Mode:

Program Policy Modification

This option applies to programs with a program policy:

Default action when a program with a program policy is modified:

If a program changes characteristics (such as a signature or version information) and it has a program policy, either the same program policy can be used for the modified program or the policy can be discarded.

You can make this decision on the Keep Program Policy? prompt, or the firewall can make a decision using the default action set here. The firewall will make a decision if:

 

The default is Keep existing permissions;program policies for modified programs will be updated with new program characteristics. To set the default, select an option (one or the other must be selected).

In this case, the firewall will treat modified programs the same way it treats programs without a program policy. (See Overview of Program Controls for a description of the flow of program controls.)

In this case, the firewall will follow whatever actions you have set in the policy (block, prompt, or allow).

Advanced

Allow Windows system process communication (recommended)

The Windows operating system uses an important set of internal programs to send and receive communication. Communication from and received by these core programs is generally considered safe.

As a default, the Allow Windows system process communication (recommended) check box is selected and the firewall allows any communication originating from these system processes.

Allow America Online® connections

If you use America Online (AOL) to connect to the Internet, select this check box.

Allow iTunes® connections

Select this option if you use Apple's iTunes to purchase media or view streaming media. Selecting this option allows the access required by certain functionality in the iTunes program.

Note: This option does not control port access.

Allow Skype® connections

Skype is a software program that allows for Internet phone calls over a peer-to-peer network. Select this check box if you use Skype to make and/or receive phone calls.

Allow World of Warcraft® connections

World of Warcraft is a role-playing game in which a large number of players interact over the Internet. Select this check box if you play World of Warcraft.

Allow Microsoft Exchange® connections (recommended)

The firewall recognizes the Microsoft Exchange connections that are used to send and receive email messages. This option allows you to open communication for programs that connect to Exchange (such as Microsoft Outlook).

As a default, the Allow Microsoft Exchange connections (recommended) check box is selected and communications are open.

Allow Microsoft Internet Explorer® connections

This option controls incoming and outgoing communication for the Internet Explorer browser application (iexplore.exe).

As a default, the Allow Microsoft Internet Explorer® connections check box is selected and the firewall allows incoming and outgoing communication for Internet Explorer.

Note: You can override this setting, for a Zone or for a direction, by creating your own program policy for iexplore.exe.

Allow passive FTP connections

A passive FTP connection is where the flow of data is set up and initiated by the FTP client rather than the FTP server. Passive FTP was created to address the problem of having the client wait for server contact.

 

As a default, the Allow passive FTP connections check box is cleared and passive FTP connections are not allowed.

 

To allow passive FTP connections, select the check box. The TCP ports used for passive FTP connections (typically between 1024 and 65535) will be open to traffic that is identified as passive FTP communication.

Note: Passive FTP connections pose a security risk by allowing applications to connect through a variety of ports.

Allow Remote Desktop connections: Outgoing / Incoming

These check boxes control whether Remote Desktop connections are allowed through the firewall. In addition to controlling the port for the Remote Desktop Protocol (TCP port 3389), the check boxes control other system settings that are part of this functionality.

As a default, the Outgoing check box is selected to automatically allow outgoing connections; the Incoming check box is cleared so that incoming connections are not automatically allowed.

 

For Remote Desktop communications, the settings made here will override the Zone port settings for the defined port 3389; however, for other types of communication that may attempt access through port 3389, the Zone settings will still apply.

 

In other words, by allowing Remote Desktop connections here, you are opening port 3389 to Remote Desktop communication. But for other types of communication, whatever you have set for port 3389 in the applicable Zone will apply, whether that is to block or allow traffic.

Block remote attacker IP addresses for [X] hours

When the firewall blocks an attack, all communication from the remote IP address that originated the attack will be blocked for [X] hours.

If your PC is being persistently attacked, this feature denies the communication at the root rather than processing it as potentially legitimate and then blocking it. This reduces the amount of processing overhead for both the operating system and the firewall.

The default time is 3 hours. You can enter from 2 to 99 hours.

You cannot enter increments of an hour (for example, 2.7 hours is not a valid entry).

Displays for Windows Vista users only:

Allow firewall to process all Internet Explorer® communication

Related topics:

Settings window - Updates tab