12.08.2012 Views

User Manual

User Manual

User Manual

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Application list<br />

Reference: Configuration options<br />

This table shows the list of applications for which rules are defined. The symbols indicate<br />

whether network access by the applications is allowed or denied. The rules for the<br />

applications can be changed using a context menu.<br />

Buttons<br />

Button Description<br />

Add by<br />

path<br />

Add by<br />

md5<br />

Add<br />

group<br />

This button opens a dialog box in which you can select applications. The<br />

application is added to the application list with the rule "Allow". If you use the<br />

option "Add by path" the added FireWall application are identified by path and<br />

file name. Rules for an application remain valid and will be used by the<br />

FireWall, even if the content of an added executable file has been changed,<br />

e.g. by an update.<br />

This button opens a dialog box in which you can select applications. The<br />

application is added to the application list with the rule "Allow". If you use the<br />

option "Add by md5" all added applications are uniquely identified using the<br />

MD5 checksum. This allows the FireWall to identify changes to the file content.<br />

If an application changes following an update, for example, the application with<br />

the rule in question is automatically removed from the application list.<br />

Following a change, the application must be added to the list again and the<br />

desired rule reapplied.<br />

This button opens a dialog box in which you can select a directory. All<br />

applications in the selected path are added to the application list with the rule<br />

"Allow".<br />

Remove The selected application rule is removed.<br />

Remove<br />

all<br />

All application rules are removed.<br />

11.6.4 Trusted vendors<br />

A list of trusted software producers is displayed under Trusted vendors. Applications from<br />

the listed software manufacturers will be granted access to the network. You can add and<br />

remove manufacturers from the list.<br />

Vendors<br />

The list shows all vendors classified as trusted.<br />

Avira Professional Security - <strong>User</strong> <strong>Manual</strong> (Status: 30 Mar. 2012) 157

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!