ESET, spol. s r. o., reserves the right to change any of the described application software without prior notice. Customer Care Worldwide: www.eset.eu/support Customer Care North America: www.eset.com/support...
Personal firewall in a network environment, as well as instructions on remote management of the Personal firewall using ERA. Why install a Personal firewall on client computers, when there is a central firewall on the company’s server? There are several reasons: • A Personal firewall can eliminate attacks from within the local network (e.g., an infected guest notebook...
Incoming connections initiated on the local computer are allowed. The Personal firewall uses a predefined set of rules provided by ESET which are suitable for most users, since there is no need for any user intervention – aside from setting up a Trusted zone – no special networking knowledge is required.
Page 5
Select the Remember action option and select Allow or Deny to create a permanent rule for the communication. If a similar communication occurs in the future, it is automatically allowed or blocked. However, such rules are very general, since they would always allow all incoming and outgoing communications (for all target ports, all IP addresses...) for the given process.
Page 6
Avoid the dialog windows which are displayed in Interactive mode by specifying rules manually in the Personal firewall Zone and rule editor. Manual rule definition is also implemented when using the Policy-based filtering mode, explained below. • Policy-based In this filtering mode only predefined rules are used. For communications where no rules have been defined, the connection is denied and no dialog window is displayed. This is the main difference between Interactive...
Zones can also be used for specifying strict rules in the Personal firewall. The behavior of the Personal firewall in a new network is determined by the option Do not display dialog with Trusted zone settings when changes in the network adapter settings are detected (e.g., change of IP address), located in Advanced setup..
General tab - Direction: IN, Action: ALLOW, Protocol: UDP. Local tab - Local port: 53 (DNS). Remote tab - Zone: Trusted zone. 2..3 Strict rules & security levels The administrator can select one of the following scenarios for deployment of the ESET Smart Security Personal...
ESET Smart Security (Setup -> Import and export settings..). 2 Please note that in order to prevent users from altering Personal firewall rules, you must set a password to protect the program parameters of the ESET Smart Security client.
In both cases, the Zone and rule setup dialog windows are similar to each other. Items with grey background mark rules defined by ESET. In certain cases, they can be partially modified using the options in the section IDS and advanced options (you can, for example, enable or disable file and printer sharing in the Trusted zone).
Page 11
Item Meaning/defines Name name of rule Direction direction of communication (In, Out, Both) Action action to be executed (deny, allow, ask) Protocol protocol select this option to log the activity connected with the rule (see the chapter on logging) Notify user displays a message when the rule is applied Local port source communication port (or group of ports)
Page 12
Local Remote Requirement Direction Protocol Application Remote port Note port address port 80 for Internet Enable updates updates, port for client ekrn.exe 80, 2221 2221 if updating computers with from local update server (e.g., from ERA) Enable port 2224 can be communication used for remote of ESS with...
As the above list implies, you must create specific rules for handling communication within ESET Smart Security itself (updates, connection to ESET Remote Administrator Server, etc.). For security purposes, these rules are not predefined by ESET. Please pay special attention to the svchost.exe process, as the rule configuration for this process depends on the local configuration.
Trusted zone, UPnP, etc.). To find the reason for a blocked communication look in the Personal firewall log by clicking Tools > Log files > ESET personal firewall log. The most important information is under Rule/worm name, where you can often find the...
Page 15
Similarly, you can enable logging for any user-defined rule in the Personal firewall by selecting the Log option in the New rule: window (Zone and rule setup window > New). The current status of the Personal firewall can be viewed by clicking Protection status > Personal firewall from the main program window.
If you want to use an exported configuration but want to change Personal firewall settings only (and you do not wish to modify parameters of the real-time protection, email protection, update, etc.), the Configuration Editor offers the following methods: Use the keyboard shortcut CTRL + D to remove blue icons in other settings (the icons will revert to grey).
4.. Summary Let’s summarize the most important points regarding deployment of the ESET Smart Security Personal firewall: • The maximum level of protection is provided through Policy-based mode, though this method often requires fine- tuning of rules and zones. • The ESET Personal firewall automatically blocks any communication which is not permitted by a rule. This is true for all modes except for Interactive filtering mode, which prompts the user to perform an action.
Need help?
Do you have a question about the PERSONAL FIREWALL and is the answer not in the manual?
Questions and answers