7812: Acronis Internet Security Suite 2010: Firewall

use Google Translate

Last update: Mon, 2010-04-19 06:50

Firewall protects your computer from hacker and malicious outside attacks

This article applies to:


The Firewall protects your computer from inbound and outbound unauthorized connection attempts.

The Firewall component of the product is automatically enabled on the first reboot of the machine after the installation of Acronis Internet Security Suite 2010.

The Firewall settings can be adjusted only in the Expert mode. Everything set in the Expert mode is used in the Novice and Intermediate modes. See Acronis Internet Security Suite 2010: Novice, Intermediate, and Expert Modes.

In the Novice and Intermediate modes you can only enable or disable the Firewall component by clicking Settings in the upper right corner of the main program window:

Firewall settings

The Firewall settings are available on the Firewall tab of the product in the Expert mode.

  • Settings - Here you can enable or disable the Firewall, set protection level and view live statistics:

    • Firewall - Enable or disable the Firewall;
    • Protection Level - Set the protection level;
    • View Whitelist - View the list of unblocked programs;
    • Advanced Settings - Here you can configure advanced Firewall settings:

      • Enable Internet Connection Sharing - Internet Connection Sharing enables members of local area networks to connect to the Internet through your computer;
      • Detect applications that changed since the firewall rule has been created - Checks each application attempting to connect to the Internet to see if it has been changed since the rule controlling its access was added. If the application has been changed, an alert will prompt you to allow or to block the access of the application to the Internet. Signed applications are supposed to be trusted, so you can check Don't detect changes in digitally signed applications to allow changed signed applications to connect to the Internet without your receiving an alert about this event;
      • Show Wi-Fi Notifications - If you are connected to a wireless network, displays informative windows regarding specific network events (for example, when a new computer has joined the network);
      • Block Port Scans - Detects and blocks attempts to find out which ports are open;
      • Enable strict automatic rules (restricts rule scope) - Creates strict rules using the Firewall alert window. With this option selected, the product will prompt you for action and create rules for each different process that opens the application requesting network or Internet access;
      • Enable Intrusion Detection (IDS) - activates the heuristic monitoring of the applications trying to access network services or the Internet.
  • Network - Here you can view and configure your network connection:

    • Adapter - The network adapter your computer uses to connect to the network or the Internet;
    • Trust Level - The trust level assigned to the network adapter. Depending on the network adapter configuration, Acronis may automatically assign the adapter a trust level or prompt you for more information;
    • Stealth Mode - Whether you can be detected by other computers;
    • Generic Profile - Whether generic rules are applied to this connection;
    • Addresses - The IP address configured on the adapter;
    • Gateways - the IP address your computer uses to connect to Internet.
  • Rules - Here you can view the existing and add new rules on your network connection:

    • Process/Adapter Types - The process and the network adapter types the rule applies to;
    • Command Line - The command used to start the process in the Windows command line interface (cmd);
    • Protocol - The IP protocol the rule applies to (Any/TCP/UDP/Number);
    • Network Events - The network events the rule applies to (Connect/Traffic/Listen);
    • Local Ports - The ports on your computer the rule applies to;
    • Remote Ports - The ports on the remote computers the rule applies to;
    • Local - Whether the rule applies only to computers in the local network;
    • Action - Whether the application is allowed or denied access to network or Internet under the specified circumstances.
  • Activity - Here you can monitor the total network/Internet activity sorted by applications:

More information

See also: