HowToFirewall Avira Premium Security SuiteAvira SupportJuly 2009
In case these settings are not enough for you or you have to activate different ports for an application, you can find more configurations in chapter
3.2.1 Adapter rulesEach hardware entity which is simulated by software or each hardware entity (e.g. a network interface card) is seen as an adapter (
3.2.1.2 Outgoing rulesOutgoing rules help to control the outgoing data transfer by means of the Avira Firewall. You can define an outgoing rule for th
• VMwareIn case the Internet access should not be possible out of your VMware, you have to enable it via the following template. - 13 -
3.2.2 Application rulesThis list contains all users in the system. If you are logged on as administrator, you can choose a user and set a rule for him
By a simple click the application is marked and can be added to the list via the button “Add”. 3.2.2.2 Application settings Here you can change the mo
3.2.3 Trusted vendorsIn the menu “Trusted vendors” a list of reliable software producers is shown. You can add or remove producers to or from the list
3.2.3.2 Automatically allow applications created by trusted vendorIf this option is activated, applications with a signature of known and trusted vend
We recommend you to keep this option activated, as we have the contact data of these vendors. The vendors are licensed software enterprises. Therefore
3.2.3.4 RemoveThe marked entry is removed from the list of trusted vendors. In order to remove the marked vendor definitely from the list, press “OK”
Contents1. BASIC KNOWLEDGE ABOUT THE FIREWALL...32. EXPLANATION OF
3.2.3.5 ReloadThe changes are cancelled. The last saved list is loaded. Tip:If you remove a vendor from the list and click on “Apply” the vendor is re
3.2.4 Settings3.2.4.1 Automatic rule timeout • Block foreverA rule which has been created for a portscan is kept automatically. • Remove rule after n
• Stop Windows Firewall on startupThis option deactivates the Windows Firewall on startup. This option is activated by default as the use of two fire
• PortscanIf you activate this option you receive a desktop notification in case a portscan has been detected by the firewall.Portscan are not always
3.2.4.4 Application rulesWith these options you set the configurations for the application of the firewall.• Advanced settings If you activate this o
3.2.5 Pop-up settings3.2.5.1 Pop-up settings• Inspect process launch stackIf this option is enabled, the process stack inspection allows a more accur
3.2.5.2 Remember action for this application• Always enabledThe option “Save action for this application” in the dialogue windows “Network event” is
the option “Save action for this application” has been deactivated for the last network event, the option won’t be active for the following network ev
been displayed, the detailed information will also be blanked for the following network event. 3.2.5.4 Allow privileged Here you can configure the set
- 29 -
1. Basic Knowledge about the FirewallA firewall works with network protocols like e.g. TCP, UDP, IT, etc.A simple example for the building up of a con
4. General information about parental controlAvira Premium Security Suite offers a parental control function to filter undesired or il-legal Internet
4.1 Activation of the parental control In order to activate the parental control, go to the configuration of AntiVir and activate the expert mode. Cho
4.3 RolesYou can add a new role or you can change the given roles. In order to add new roles, enter the role name in the free box. 30 sign are given f
Example: www.google.com and URLs of the category Pornography, Erotica/Sex and Sects should be blocked.The categories are provided by a huge data base
5. Changing the update intervalsThe update of the virus definitions are predefined in the scheduler with an interval of two hours. You can change this
5.1 Changing of an update job Click with the right mouse button on “Two hourly update” and choose “Edit selected job” in the context menu.Now the assi
By a click on the first box you can change the configuration from “Interval” to “Daily”. In next box you can choose the desired update time. By activa
Click on “Next”, in order to get to the selection of the display mode. Click on the selection box and you can choose one of the following display mode
• Invisible: The update is executed without any notification• Minimized: The update is executed in the background and confirmed by a slide-up. • M
protocols if necessary, similar to domain names. The registration of the ports offers the advantage that an application can be identified according to
3. Configuration Possibilities3.1 Security LevelFirst you have to decide which security level you want to use. A security level which is too high migh
• Open the register "Online protection" The register is opened by a left mouse click on the register “Online protection”. The register “Onl
• Adaption of the Security Level of the Firewall By clicking and keeping hold of the security level controller you can adapt the security level. The p
3.1.3 HighThe computer is invisible in the network and the connection coming from outside are blocked. Flooding and port scan are prevented.3.1.4 Medi
Also using the level “Medium”, problems with the network can occur. In this case you should change the level to “Low”. The preset level is more distin
Commenti su questo manuale