Enabling And Disabling A Firewall Policy - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

210
Managing firewall protection
Creating a firewall policy

Enabling and disabling a firewall policy

How to create a firewall policy (continued)
Table 15-3
Task
Create firewall rules
Adjust the firewall
security level
Enable and customize
notifications to users
that access to an
application is blocked
See
Managing firewall protection"
See
Editing a policy"
on page 122.
Firewall policies are automatically enabled when you create them. You can disable
a firewall policy as needed, and then enable it again. You must enable a firewall
policy for it to be active.
You might want to disable the firewall for any of the following reasons:
You install an application that might cause the firewall to block it.
A firewall rule or firewall setting blocks an application due to an administrator's
mistake.
The firewall causes network connectivity-related issues.
The firewall might slow down the client computer.
Description
Firewall rules are the policy components that control how the
firewall protects client computers from malicious incoming
traffic and applications. The firewall automatically checks all
incoming packets and outgoing packets against these rules. It
allows or blocks the packets based on the information that is
specified in rules. You can modify the default rules, create new
rules, or disable the default rules.
When you create a new Firewall policy, Symantec Endpoint
Protection Small Business Edition provides default firewall rules.
The default firewall rules are enabled by default.
See
Setting up firewall rules"
You can specify the security level of the firewall rules. The
security level determines how stringently the firewall rules are
applied.
See
Adjusting the firewall security level"
You can send users a notification that an application that they
want to access is blocked.
These settings are disabled by default.
See
Notifying the users that access to an application is blocked"
on page 216.
on page 205.
on page 219.
on page 211.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents