Firewall Protection

Print Friendly, PDF & Email

Firewall shields your system from intruders and hackers by monitoring and filtering incoming and outgoing network traffic. Any suspicious program that may be harmful to your computers or systems is blocked. Firewall protects your computers from malicious programs either from outside internet connection or from within networks incoming into your system.

Configuring Firewall Protection

To configure Firewall Protection, follow these steps:

  1. Open Quick Heal Total Security.
  2. On the left pane, click Protection and then click Firewall Protection.
  3. Turn Firewall Protection on or off by using the toggle button.
    By default, Firewall Protection is turned on.
  4. To set Firewall Protection, click anywhere in the Firewall Protection area.
  5. To enable monitoring of unsafe Wi-Fi Networks, turn Monitor Wi-Fi Networks on.

    If you have enabled this option and try to connect to the unsecured Wi-Fi connections, an alert will be shown. You can decide whether you want to connect to such unsecured connections.

  6. To configure rules for accessing the Internet and control network traffic, set the following policies:
    • Program Rules: Create rules for programs accessing the Internet.
    • Advanced Settings: Create rules for incoming and outgoing network traffic.

Program Rules

With Program Rules, you can allow or block programs from accessing the Internet.

To create rules for programs, follow these steps:

  1. On the Firewall Protection screen, click the Configure button next to Program Rules.
  2. On the Configure Program Rules screen, click the Add button to add a program.
    Only an executable program can be added.
  3. The program that you added is enlisted in the program list. Under the Access column, select Allow or Deny for accessing the network as required.
  4. To save your setting, click OK.

Allow only trustworthy programs

Trustworthy programs are those programs that are verified and their identity is known while untrustworthy programs are those ones that are not verified or are suspicious. Malicious programs mask their identity to run a covert operation. Such programs may be harmful to the network and computers.

You can block all untrustworthy programs from accessing the Internet by selecting the Allow only trustworthy programs checkbox.

Security Level

Firewall security level includes the following:

  • Low: Allows all incoming and outgoing connections.
  • Medium: Monitors incoming traffic and displays the message as per suspicious behavior of an application.
  • High: Monitors both incoming and outgoing traffics and displays the message as per suspicious behavior of an application.
  • Block all: Blocks all incoming and outgoing connections. If you set this security level, Internet connection for all applications including Quick Heal Total Security will be blocked. For example, Quick Heal update and sending [system information](#_Logs_1) among other features may not work.

Advanced Settings

To create rules for incoming and outgoing network traffics, follow these steps:

  1. On the Firewall Protection screen, click the Configure button next to Advanced Settings.
  2. On the Advanced Settings page, select the following as required:
    • Display Alert Message: Select this option if you want to get alert messages if connections matching exceptions rule are made for blocked outbound connections. This applies to outbound connections only.
    • Create Reports: Select this option if you want a report to be created. You may also configure a different path to save the report.
    • Network Connections: Using this option, set a network profile for network connections.
    • Traffic Rules: Using this option, set rules for network traffic.
  3. To save the settings, click OK.

Network Connections

With Network Connections, you can set a Firewall profile for network connections. Under Network Profile Settings, you can see the following settings.

Settings Description
Network Profile Home: All incoming and outgoing connections are allowed except exceptions. Work: All incoming and outgoing connections are allowed except exceptions. Public: All incoming and outgoing connections are allowed except exceptions. Restricted: All incoming and outgoing connections are blocked except exceptions. Note: The logic for network profile may be changed based on your requirement. For example, if a network environment is considered less risky, you may turn stealth mode on or off. Similarly, you may allow or block sharing of the file and printer. The default setting is ideal for required security.
Stealth Mode Enabling Stealth Mode hides the system in the network making it invisible to others thus preventing attacks.
File & Printer Sharing Allowing this option will enable you to share file and printer between other users and you. With sharing of file and printer, the files may be accessed by unauthorized entities.

Traffic Rules

With Traffic Rules, you can allow or block network traffic. You can add exception to allow or deny incoming and outgoing communications through IP addresses and ports.

To configure a policy, follow these steps:

  1. On the Advanced Settings screen, click the Traffic Rules tab.
  2. Click the Add button.
  3. In the Exception Name text box, write a rule name and then select a protocol. Click Next.

    The protocol includes: TCP, UDP, and ICMP.

  4. Under Local IP Address, select either Any IP Address, IP Address, or IP Address Range. Type the IP Address accordingly and then click Next.
  5. Under Local TCP/UDP Ports, select either All Ports, Specific Port(s), or Port Range. Type the Ports accordingly and then click Next.
  6. Under Remote IP Address, select either Any IP Address, IP Address, or IP Address Range. Type the IP Address accordingly and then click Next.
  7. Under Remote TCP/UDP Ports, select either All Ports, Specific Port(s), or Port Range. Type the Ports accordingly and then click Next.
  8. Under Select Action, select either Allow or Deny.
  9. Under Network Profile, select either or a combination of the profile options such as Home, Public, Work, or Restricted.
  10. Click Finish.

The following table describes the buttons and their functions.

Buttons Description
Add Helps you create an exception rule.
Delete Helps you delete an exception rule from the list. Select the rule and then click Delete.
Up Helps you move a rule upward to arrange according to your preference.
Down Helps you move a rule downward to arrange according to your preference.
Default Helps you set the rules to default settings.
OK Helps you save your settings.
Cancel Helps you cancel your settings and close the Advanced Settings dialog.
Was this page helpful?

Leave a Comment