Page tree
Skip to end of metadata
Go to start of metadata

Queries

Here you can specify whether, when and how the firewall should query users when programs request a connection to the Internet or network.

Define rule

If the firewall detects a connection being made to the network, an information box appears in which you specify how to proceed for this particular application. Specify here precisely how to proceed in terms of allowing or forbidding network access:

  • Per Application: This enables you to specify universal authorization or denial of network access by the currently selected application on any port and using any transfer protocol (e.g. TCP or UDP).
  • Per Protocol/Port/Application: The application requesting network access is only permitted to go online with the requested transfer protocol and on the specified port. If the same application requests an additional network connection on another port or using a different protocol, the query will appear again, allowing you to create another rule for it.
  • Application, if at least x inquiries are pending: There are applications (e.g. Microsoft Outlook) that send identical requests to multiple ports when requesting network access or that use different protocols simultaneously. Since, for example, this would cause several queries in the Protocol/Port/Application setting, you can specify here that applications should receive general permission or refusal for network use as soon as you have allowed or denied connection by the user.

Unknown server applications

Applications that are not yet managed using a rule in the firewall may be handled in a different manner. The time of the inquiry lies within a certain latitude. If the server application goes to "on receipt", this means that it is waiting for a connection request as if on standby. Otherwise the query is only generated when the actual connection request is made.

Check for unprotected networks

Of course, a firewall can only function properly if all the networks accessed by the computer it is protecting can also be detected and monitored by it. Therefore you should always have this check enabled for unprotected networks.

Repeat application queries

You can bundle recurring requests for connection of an application. This way, queries do not keep appearing during connection attempts for which you have not yet specified a rule, but rather only in e.g. 20-second intervals or some other period of time defined by you.

  • No labels