ESET Endpoint Security
 
ESET Endpoint Security – Table of Contents

Firewall

The firewall controls all network traffic to and from the system by allowing or denying individual network connections based on specified filtering rules. It provides protection against attacks from remote computers and enables blocking of some services.

Enable Firewall

We recommend keeping this feature enabled to secure your system. With Firewall enabled, network traffic is scanned in both directions.

Rules

Firewall Rules represent a set of conditions used to meaningfully test all network connections and all actions assigned to these conditions. Using Firewall rules, you can define the action that is taken when different types of network connections are established. Rules are evaluated from top to bottom and you can see their priority in the first column. The action of the first matching rule is used for each network connection being evaluated. If a new unknown communication is detected, you must carefully consider whether to allow or deny it. Unsolicited, unsecured or unknown connections pose a security risk to the system. If such a connection is established, we recommend that you pay attention to the remote device and the application attempting to connect to your computer. Many infiltrations try to obtain and send private data or download other malicious applications to host workstations. The Firewall enables you to detect and terminate such connections.

Rules setup allows you to view all rules applied to traffic generated by individual applications within trusted zones and the Internet. To access rule filtering setup click Edit. If you have many Firewall rules, you can use a filter to show only specific rules. To filter Firewall rules, click More filters above the Firewall rules list. You can filter the rules based on the following criteria:

Origin

Direction

Action

Availability

By default, the pre-defined Firewall rules are hidden. To display all pre-defined rules, disable the toggle next to Hide built-in (pre-defined) rules. You can disable these rules, but you cannot delete a pre-defined rule.


Note

Click the magnifier icon at the top right to search for rule(s).

Columns

Priority—Rules are evaluated from top to bottom and you can see their priority in the first column.

Enabled—Shows if a rule is enabled or disabled; the corresponding check box must be selected to enable a rule.

Application—The application to which the rule applies.

Direction—Direction of communication (incoming/outgoing/both).

Action—Shows the status of communication (block/allow/ask).

Name—Name of the rule. The ESET Icon ESET logo represents a pre-defined rule.

Times applied—Total number of times the rule has been applied.

Click the expand icon Expand to display the rule details.

Control elements

AddCreate a new rule.

EditEdit an existing rule.

Delete—Remove an existing rule.

Copy—Create a copy of a selected rule.

Top/Up/Down/Bottom Top/Up/Down/Bottom—Enables you to adjust the priority level of rules (rules are executed from top to bottom).

Filtering mode

1.Automatic mode – This mode is the default mode. This mode is suitable for users who prefer easy and convenient use of the firewall with no need to define rules. Automatic mode allows standard outbound traffic for the given system and blocks all non-initiated connections from the network side. You can also add custom, user-defined rules.

2.Policy-based mode – Blocks all connections that are not defined by a specific rule that allows them. Policy-based mode allows advanced users to define rules that permit only desired and secure connections.