Adaptive defense 360 provides three basic tools to filter the network traffic that protected computers send and receive:
These rules describe communication characteristics (ports, IP addresses, protocols etc.) in order to allow or deny the data flows that coincide with the configured rules.
Rules that allow or prevent the programs installed on user computers from communicating.
Detects and rejects malformed traffic patterns that affect the security or performance of protected computers.
The first thing you must do to configure the firewall protection is decide if the users to which the profile will be applied will be allowed to configure the firewall from their computers (firewall in user mode) or if you, as the administrator, will do it (firewall in administrator mode).
Select the option that allows users to configure the firewall protection.
In this case, the end user will be able to access the firewall settings from the agent installed on their computer.
If, otherwise, you want the firewall settings to be available only from the Web console, you, as the administrator, will establish the firewall restrictions, block rules, permissions, etc. to be applied to the computers you select.
In that case, keep the default option selected: Apply the following settings to the firewall.
You must also choose whether the firewall protection configuration will be applied to Windows workstations and/or Windows servers. Select the relevant checkboxes.
Related topics