Good afternoon! It would be convenient to add the "hide system processes" checkbox in the add processes window. It would be convenient for novice users.
It is very useful to see a list of all working rules. Including those built into windows and created earlier. That is, a complete list of firewall rules. You need a search field, the ability to filter (enabled/disabled), color marking, manual sorting (dragging).
For example, you can use Binisoft Windows Firewall Control.
You also need to check the functionality of built-in utilities, such as ping, tracert, and so on. What I wrote about earlier.
Click the Add button under the list of applications and services, then select the apps or services you want to add. After an app or service is added, click its up and down arrows and choose whether to allow or block connections through the firewall.
Firewall App Blocker is a free and portable firewall utility which can quickly block any Windows applications from accessing the Internet.The layout of Firewall App Blocker is simple to use and by taking advantage of the built-in Windows Firewall, you're very unlikely from noticing any increase in CPU or memory usage.Using this firewall application is as easy as dragging and dropping application executables into the main window. Once added, you can apply the changes, add and remove items and export/import them. You can also right-click items in the listings of Firewall App Blocker to delete, rename, block, unblock, etc.The options of this application aren't many, but you can quickly use the options menu to reset firewall settings or change firewall settings.All in all, this application is very useful for blocking any types of apps in Windows in an easy and quick way.Features of Firewall App Blocker
Recently, I bought a EA account with Jedi Survivor and I wanted to play it. However, I get the error "Too many computers have accessed this account's version of Star Wars Jedi Survivor". I searched in internet for a fix and I saw that I need to put a firewall blocker for the EA App. So, is it possible to block the connection of EA App with a firewall blocker on Linux?
maybe you have to look at your zones in your firewall rule, choose lan as source zone, and wan as destination zone and help yourself with the web and application protection to set what you want to block.
Most of the time its reset and Fin packets that a stateful firewall sometimes drops. This shouldn't affect your port 80 browsing. You can really look at what exactly the dropped traffic is by following sachingurung guide here and follow rule1.
Now this should not be possible since the firewall rule is set to totally block any data from internal device accessing other devices on the LAN. The firewall rule that allows all traffic from Internal to IPv4 should not be causing this issue since IPv4 is "the internet" and does not include file sharing services. Perhaps the X-plore app is using some strange protocol to access my network share that is bypassing the firewall?
Big issues here. I just deleted every single firewall rule and yet I am able to browse the internet which I should not be able to do since the "web browsing" firewall rule Internal->ANY->Internet IPv4->allow isn't even listed anymore and this never used to happen. Internet browsing should be blocked until this rule is created and enabled.
2. The reason you can reach the internet with no firewall rules is because you have enabled the web proxy and web traffic is going through that. You can confirm this by having no rules and disabling the proxy. You will then have no access.
The UTM does have it's learning points like this and I too was caught out because we're used to the old FW rules needing to be in place. Basically a good rule of thumb is.... if a proxy is enabled eg smtp, web, WAF etc, the traffic will hit that first before the firewall rules (with a few exceptions)
Now, I can't find a way a setting for that. This new firewall seems to have no settings, at all. There's "Allow & Block Connections", and I can see it has blocked three connections by one app, and I could allow those IP's, but there's nothing on the "Allowed Connections". Apparently that list gets items only if you allow something that's already been blocked?
Unfortunately, as you mentioned in the previous version, the new firewall might not have the feature to automatically prompt you when an allowed application is updated. However, you can periodically check the "Allowed" list and remove or modify permissions for applications that you believe have been updated or changed.
I hope this helps you regain control over your firewall settings and achieve the security level you seek. If you still have concerns, consider contacting McAfee's customer support for further assistance with their product.
Thanks. I contacted McAfee's chat support where the only suggestion was to reinstall McAfee. I did that, and now I have all the firewall controls back, but this was a downgrade. The version I had was 16.0 R107. The one that was installed after downloading the setup file is 16.0 R51. As far as I can tell, the versions starting with R100 are the new ones, and the double-digit ones are the old ones. I now have the app boost and other features taken away from the new version, so I think I'll lose the current firewall settings once McAfee does an automatic update.
Looking at the debloating guide I asked myself if I should install an ad blocker, a firewall or both. Is it redundant to have both? Does it make more sense to install a firewall and add an ad block list to it?
However, one of my clients is behind a relatively simple BT Home Hub which doesn't offer much in terms of outbound firewall connectivity - and they have a pretty unmanaged Windows 2012 server sat on their LAN. I was surprised (well not that surprised) to learn that the default on Windows 2012 firewall outbound is to allow all outbound traffic. I'd always assumed that because there are a whole block of enabled outbound rules sat there that only the ports/programs configured in those rules have access. I was perplexed how I was able to telnet to their ISP's SMTP server without an obvious rule allowing it. Change the default behaviour to block briefly and yes, lost telnet to port 25.
I installed yesterday an application for my Linux Mint os called Portmaster. It is an open source firewall for PC. There is also Windows version available. I use free version which seems to be sufficient for my use case.
The goal i'm trying to accomplish is that for the mail server to be the only machine sending out mail on the network so ihave been looking into setting up a firewall filter to block everyone on the subnet except for ail server but the failer is stressful bcoz it once i commit the changes the firewall port locks up......
In my case, the digital signature of those many applications is a long name: "Beijing Sogou Technology Development Co., Ltd.". I have copy-pasted this signature name in the firewall rules, blocking both direction, TCP & UPD, and asked eset to warn me when applications with this signature is blocked. But Eset fails to block anything. Could you check on your side if the method for blocking apps according to digital signature is efficient? Is it because the name is too long? Would it be possible use only one word (i.e. "Beijing" or "Sogou") instead of the whole signature name?
Therefore, the name to be entered in the Publisher name of an Eset firewall rule is Seagate Technology. To further show the issue with Publisher names, there's an unsigned uninstaller in the same associated directory. Its publisher company name shows as Seagate Technology LLC.
Therefore the question is how specific is Eset's matching of Publisher name in a firewall rule to the .exe's actual publisher name? All software I have used in the past that has Trusted Publisher detection capability always provided a list of Publisher's to select from with the capability to add new ones as needed.
When you create the firewall rule, do so for an existing signed app. The Publisher info should be auto copied into the rule. Now delete the data shown in the Application path field and save the rule. Finally, edit the rule again and verify nothing is shown in the Application path field. Also verify this rule proceeds in the Eset firewall rule set any other existing rules you created for Beijing Sogou Technology Development apps; better yet temporarily disable those rules. Now test.
1. Not all the apps are being signed using the same cert. of the app you used to create the Publisher based firewall rule. That is the Publisher name used on those apps is different from the one specified in the firewall rule you created. In this case, a unique firewall rule would have to created for each different Publisher name.
Looks like you didn't follow the instructions I posted in my August 27 dated reply. I specifically stated that after creating a firewall rule for a specific Beijing Sogou Technology Development app, you manually remove the .exe data from the firewall rule; i.e. the field is now blank, prior to saving the rule;
ffe2fad269