Logging Network Activity - ESET PERSONAL FIREWALL User Manual

Table of Contents

Advertisement

Application modification detection helps guard against malicious code which presents itself as a legitimate process.
Consider a malicious program which replaces the Outlook.exe process with its own code for the purpose of sending
unsolicited email via SMTP. Without application modification detection, the malicious code would not be stopped,
since a rule exists which allows the legitimate process Outlook.exe to send and receive email (SMTP).
The modification detection feature also has its cons, but these can be alleviated through the use of exclusions.
For example, a regular, legitimate upgrade to a newer version of Adobe Acrobat Reader may result in a process
modification, since it automatically updates itself and downloads PDF documents from the Internet. Thus, a
specific rule (exclusion) would need to be defined to allow this activity.

3..2 Logging network activity

Information about processed or blocked activity can be saved to a log and analyzed. Logging can be useful in
determining why the Personal firewall blocked a certain communication. Press F5 to display the Advanced Setup
window and then click Personal firewall > IDS and advanced options and select Log all blocked connections. Use
the same dialog window to configure the IDS (Intrusion Detection System) as well as other general options (Allow
file and printer sharing in the Trusted zone, UPnP, etc.).
To find the reason for a blocked communication look in the Personal firewall log by clicking Tools > Log files > ESET
personal firewall log. The most important information is under Rule/worm name, where you can often find the
name of a rule that's disrupting communication.
14

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the PERSONAL FIREWALL and is the answer not in the manual?

Questions and answers

Table of Contents