User Manual
User Manual
User Manual
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Application list<br />
Reference: Configuration options<br />
This table shows the list of applications for which rules are defined. The symbols indicate<br />
whether network access by the applications is allowed or denied. The rules for the<br />
applications can be changed using a context menu.<br />
Buttons<br />
Button Description<br />
Add by<br />
path<br />
Add by<br />
md5<br />
Add<br />
group<br />
This button opens a dialog box in which you can select applications. The<br />
application is added to the application list with the rule "Allow". If you use the<br />
option "Add by path" the added FireWall application are identified by path and<br />
file name. Rules for an application remain valid and will be used by the<br />
FireWall, even if the content of an added executable file has been changed,<br />
e.g. by an update.<br />
This button opens a dialog box in which you can select applications. The<br />
application is added to the application list with the rule "Allow". If you use the<br />
option "Add by md5" all added applications are uniquely identified using the<br />
MD5 checksum. This allows the FireWall to identify changes to the file content.<br />
If an application changes following an update, for example, the application with<br />
the rule in question is automatically removed from the application list.<br />
Following a change, the application must be added to the list again and the<br />
desired rule reapplied.<br />
This button opens a dialog box in which you can select a directory. All<br />
applications in the selected path are added to the application list with the rule<br />
"Allow".<br />
Remove The selected application rule is removed.<br />
Remove<br />
all<br />
All application rules are removed.<br />
11.6.4 Trusted vendors<br />
A list of trusted software producers is displayed under Trusted vendors. Applications from<br />
the listed software manufacturers will be granted access to the network. You can add and<br />
remove manufacturers from the list.<br />
Vendors<br />
The list shows all vendors classified as trusted.<br />
Avira Professional Security - <strong>User</strong> <strong>Manual</strong> (Status: 30 Mar. 2012) 157