1..
Introduction ................................................................................................3
2.. ESET Personal firewall concepts ........................................ 4
2..1 Filtering modes in ESET Personal firewall ................................4
2..2 Zones.................................................................................................................................... 7
2..3 Strict rules & security levels ....................................................................8
2..4 Rule configuration strategy for large networks ..............9
3.. Creating rules and zones in the ESET graphical
interface ........................................................................................................ 10
3..1 Detection of modified applications ..............................................13
3..2 Logging network activity ..........................................................................14
3..3 XML Configuration files & ESET Configuration
Editor ................................................................................................................................16
4.. Summary ........................................................................................................17
Contents
ESET
Personal Firewall
Copyright © 2008 by ESET, spol.. s r..o..
ESET Personal Firewall was developed by ESET, spol. s r. o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be reproduced,
stored in a retrieval system or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording, scanning, or otherwise
without permission in writing from the author.
ESET, spol. s r. o., reserves the right to change any of the described
application software without prior notice.
Customer Care Worldwide: www.eset.eu/support
Customer Care North America: www.eset.com/support
REV.20080303-001