I think that security is a concern for every computer user. And if with such a nuisance as viruses and Trojans everything is more or less clear, then with direct attacks on the system things are much more complicated. To avoid infringement on information dear to your heart, you need to install the so-called FireWall. The principle of operation of any firewall is based on complete control of all services and programs that need access to the World Wide Web or local network.
Setting up such a “shield” correctly is not an easy task. Developers understand this and often create a simple and clear interface with a minimum visible settings programs. This approach is also used in the Agnitum Outpost Firewall program. However, automatic configuration is not always suitable for a particular user. And this is where many people are faced with the problem of creating a rule for a specific program.

All tests were carried out with Agnitum Outpost Firewall ver. 3.5. But many settings will be present in earlier versions of this product. If something is not indicated in the article, it is better not to touch it and leave it as it is.
So, let's begin.

Installation does not cause any problems. They will ask you to reboot - we agree.
Next comes the creation of an automatic configuration - we create it.
Immediately go to “Settings - System - Global rules and access to raw socket”. Click the “Settings” tab and see all the global rules that apply to all programs and services on the network.

Allow DNS Resolving. Without this rule, working on the network will be impossible, as access to the DNS server will be blocked.
. Allow Outgoing DHCP. This rule allows DHCP to be used. If your provider uses DHCP, then leave it, if not, feel free to disable it.
. Allow Inbound Identification. I recommend turning it off. For most users, receiving incoming data on port 113 for identification is of no use.
. Allow Loopback. Make loopback connections, which are more often called “loopback”. If you use such a connection, then leave the checkbox, if not, feel free to disable it.
. Allow GRE Protocol. Essential for everyone who uses PPTP (VPN access). If you do not use such a connection, then turn it off. If in doubt, contact your provider.
. Block Remote Procedure Call. Blocking remote procedure calls. Most users have absolutely no need for remote procedure calls. But everyone bad users such a right will certainly come in handy. We leave the checkbox.
. Deny Unknown Protocols. This rule allows you to block any connection if the protocol type cannot be determined. We leave the “bird”.

All other rules allow you to work correctly with the TCP and UDP protocols, so we leave everything as it is.

Here we can completely block access to a specific system port. How to do it? It's quite simple.

1. Select “Add” to create a new system/general rule.
Next, a window will open with options (options) for setting up general/system rules.

2. Select an event for the rule, label “Where is the protocol”, “Where is the direction” and “Where is the local port”.

3. In the “Rule Description” field, click on “Undefined” in the “Where is the protocol” line and select the required protocol.

4. In the “Rule Description” field, click on “Undefined” in the “Where is the direction” line and select “Incoming” connection.

5. In the “Rule Description” field, click on “Undefined” in the “Where is the local port” line and indicate the port number that you want to close.

6. In the “Select Actions” field for the rule, check “Block this data” and mark the rule as “High Priority Rule” and “Ignore Component Control”.

7. In the Rule name field, enter the name of the rule and click “OK” to save it. The name of the rule should appear in the “Options” list.

I strongly recommend creating rules for complete blocking incoming traffic UDP ports 135, 137, 138 and TCP ports 135, 139,445. You can safely block port 5000 for both incoming and outgoing connections (this is Universal Plug&play). You can also close port 5554 and 9996 via TCP. It is through these ports that attacks on your computer most often occur.
Next, go to the “Applications” tab and remove all programs from there. Why do we need this? Now I'll try to explain. An ordinary user needs only a few programs to work: a browser, a download manager, an email program, an ftp client, ICQ. The rest will wait...

We set the “Training” policy, log on to the Internet and launch each of them. Outpost will ask you to create a rule for each program, which we do. Then we edit each rule individually.

For Opera browser Outpost developers allowed the following connections: outgoing for the TCP protocol to ports 21,25, 80-83, 110, 119, 135, 443, 1080, 3128, 8080,8081, 8088. Quite a lot, isn’t it? Let's figure out what we need from a browser (The analogy with IE and Mozilla will be almost complete). We block port 21 (Opera FTP connection) first, but if you download files from ftp servers using a browser, you should leave a checkmark. Ports 80-83 are responsible for working via the HTTP protocol. We don't touch them. Ports 25 (Opera SMTP connection) and 110 (Opera POP3 connection) are responsible for sending and receiving mail, respectively. If you do not use a third-party email program, then leave it; if not, feel free to uncheck the box. News arrives on port 119 via the NNTP protocol; if you do not receive news this way, then you can safely close the port. 135 should be blocked. Port 443 is responsible for connections via the HTTPS protocol, which is more often called SSL, which is used to organize a cryptographically secure channel for exchanging data (passwords, keys, personal information) on the network. I think it's best to leave it unchanged. Port 1080 is responsible for SOCKS connections. If you do not use SOCKS servers during your work, you can safely disable the port. 3128, 8080,8081, 8088 - these are all ports for working with proxy servers: if you use them, leave them.

Outlook works using outgoing TCP connections on ports 25. 80-83,119, 110,143,389,443.995,1080. 3128. 8080. 8088. We do not touch the 25th and 110th - they are responsible for performing the main function. We have already dealt with port 119. Port number 995 - receiving mail via the POP3 protocol using a secure SSL/TLS connection. If you don’t need this, then close port 995. Port 143 is responsible for working with mail using the IMAP protocol. No IMAP - port closed. Through port 389 you can access the LDAP server. It's unlikely to be useful at home. So, we're closing. The Bat! uses almost the same ports as Outlook, except for the ports required for PROXY.

The rules for download managers should not be changed. They use only the necessary ports, but if you do not use a proxy, you can safely block the same ports 3128. 8080. 8088.
For the ftp client, only port 21 should be left.

There are some utilities you need to pay attention to.
. Alg.exe - Microsoft Application Layer Gateway Service. This process provides support for Internet Connection Sharing / Internet Connection Firewall plugins. These services enable multiple computers on a network to connect to the Internet through one computer. In most cases it is not needed.
. Conf.exe is Net-Meeting. Not needed - turn it off..
. Dwwin.exe - Microsoft Application Error Reporting. Clear without words!
. Mstsc.exe - Microsoft Remote Desktop. Remote desktop connection.
. Explorer.exe - Microsoft Windows Explorer. What does Internet Explorer need?
. Lsass.exe - Local Security Authority Service. This local server authenticator, which spawns the process responsible for authenticating users in the Winlogon service.
. A Messenger service that forwards administrative messages between clients and servers. By and large, the home user does not need it.

I have long wanted to post this famous program that is responsible for the security of your computer. So, here is a professional firewall, with its help you can protect the system, and therefore its users, by applying filtering to both incoming and outgoing network traffic, download Agnitum Outpost Firewall possible from our project.

The product is perfectly capable of controlling current connection, it can also detect suspicious activities. If you want to completely protect yourself from everything written above, then you need to use professional products, for example Agnitum Outpost Firewall, which is what we are talking about. The program is able to use a multi-level approach to problems, you will receive excellent proactive protection, it will be based on behavior analysis.

I would like to note the convenient user interface of Agnitum Outpost Firewall, there is Russian support, which of course should make our users happy. When you launch it for the first time, a wizard will open, where you will need to specify some parameters, you can just wait until the product itself analyzes and configures everything. After Agnitum Outpost Firewall will work in training mode, you will need to answer some questions of the program yourself, for example, is this or that connection safe, then rules will be created and, as a result, the firewall will be trained successfully.

Issue name: Agnitum.Outpost.Firewall.Pro.9.3.4934.708.2079
Developer: Agnitum Ltd
License:ShareWare
Language: Multi + Russian
Size: 35.26 & 42.86 MB
OS:Windows
Download.

In December 2015, Yandex acquired the technologies of Agnitum. These technologies will be used to protect Yandex Browser users. As a result of the agreements reached, Agnitum ceases direct and affiliate sales of the Outpost product line. Updating anti-virus databases, fixing errors and technical support will be carried out until December 31, 2016.

It must be said that the opinion is not the worst, but rather peculiar.
In general, let's go.

Introductory Description of Features

Actually, the products of the outpost line, according to the developer, are represented by the following three types of configurations (I do not take office options into account):

  • Outpost Firewall FREE (English only)- provides basic protection for those who work on the network irregularly and for a very limited time.
  • Outpost Firewall PRO - provides excellent protection against unauthorized entry into your computer and leakage of confidential data.
  • Outpost Security Suite Pro - provides 100% computer protection. It includes everything you need: spam filter, proactive protection.

I rejected the Free version option as not interesting due to, theoretically, reduced functionality and, to be honest, the lack of . In the future, I will dig deeper into this build and tell you about it (most likely in the upcoming FireWall test), but so far something has not come together :)

Security Suite Pro, in my opinion, is too crammed with all sorts of different things, and I by nature do not recognize attempts to cram an iron + refrigerator + hair dryer + into a ballpoint pen washing machine, because in practice, at best, nothing works, and at worst, everything works, but so crookedly and sluggishly that you want to howl. Therefore, I considered such a product not even appropriate for testing. Moreover, demolish installed antivirus I somehow didn’t want to because it was also at the testing stage and was installed in the system quite recently.

Well, that leaves, of course, Outpost Firewall PRO, which, in fact, I installed on the unfortunate x64 system that I’ve been torturing lately.

Why you shouldn't choose all-in-one versions

I must say that this very PRO version is also packed with a lot of different things, but, as is usually the case with “one hundred in one” products, firstly, not all of them are needed, and secondly, these functions do not work not as well as they work in analogue programs (so to speak, “one in one”), whose primary goal is to perform just these (and only these) functions.

The first thing I immediately disabled was web control. The thing, firstly, is implemented stupidly, i.e. without proper configuration, she rested her feet and completely refused to let me even in (without any argument by the way), and, secondly, it is absolutely not clear why she is in the firewall at all, if all she can do is (cut ads, block Java, etc. etc.) has long been implemented and included in the puzzle with a number of adequate or even settings based on the browser kernel. In general, the web control turned out to be kind of stupid, for which he was punished :)

Following web control, oddly enough, such a thing as local security went on vacation, which, according to the developer (and logically), monitors changes in applications, system resources and blocks startup attempts malware directly or by intercepting other applications. It sounds beautiful, but the thing is wildly annoying, constantly annoying with its screams about every sneeze of every program and plus, even after proper configuration, in my opinion, it is useless (except in a number of completely neglected cases or on servers (and even then not a fact)) and takes a fair amount of system resources.

Description of possibilities and discussions on the topic

It was not possible to find anything else, ahem, superfluous during communication with the program, and therefore now about the most important thing, i.e. about the firewall itself, its core and other joys of this miracle.

The first and most important thing I liked most is how informative it is. I love it when everything is competently, detailed and clearly laid out on the shelves and, as a result, accessible, understandable and manageable. This is where happiness happened, because the outpost is incredibly informative - everything is there, from the name of the process to the port and traffic. See for yourself:


This kind of detailed information can’t help but rejoice, because using all the data provided, you can configure network security in the most appropriate way.

The second thing I liked and what is important is the security in terms of repelling attacks, and in general it is excellent. During all the time I was using it, only one attack got past the firewall, and it’s not entirely clear that it did, maybe I missed something. The firewall registers all known (at least to me) types of attacks, and what I liked is that it can cut off trivial requests by local network, thereby reducing the load on it. The only thing I still don’t understand is on what principle the firewall blocked the address of the attacking computer, because it did this very rarely, which, however, is not very important, given that the attack was repelled successfully. I have been monitoring the firewall all this time using APS and tracking logs on . Speaking of the router, the firewall in its firmware, as it turned out, periodically allowed a number of attacks (unless, of course, outpost is lying and imitating active work, as one well-known complex did in my practice network security). Oh yes, I was also pleased with the work with and filtering the port on which, in fact, the torrent was spinning - everything unnecessary is cut off and only connections of the proper type are allowed through. Very, very good.

Same thing, i.e. The same quality of work also applies to firewall monitoring of applications on a computer’s access to the Internet, namely, everything is implemented clearly, competently, and adequately. It is possible to fine-tune and flexibly configure how programs work with the network, both down to the smallest detail (port, protocol, etc.) and on the basis of general platitudes such as prohibiting/allowing all activity of a particular application (such things greatly simplify setting up a firewall for beginners). It is possible to create general rules for applications. There is a training mode. In short it's great :)

In general, the implementation of these two things, i.e. detection/reflection of attacks and control of application access to the Internet is really good and adequate, and these are, in my opinion, the main parameters of a firewall. For avid gamers, there is, by the way, detection of the moment of launching full-screen applications and the firewall switching to the so-called game mode, when the program stops pestering the user with questions, self-learning / other joys and goes into a silent blocking mode of external intrusions.

By the way, the firewall has a protection module, which, from experience, is sometimes vital/useful, as well as the possibility of a hidden mode of operation (which, in general, is also part of the firewall’s self-defense). I can’t say how adequately these moments work because they are serious hacker attacks didn't order :)

In general... the thing is quite pleasant to use, quick to learn and, I would say, user-friendly. Yes, not without minor flaws and oddities, but there is still friendliness, especially since there is very adequate support for the Russian language.

I’ll tell you a secret that I have some doubts about the speed of such happiness on an x32 system and weak machines ( test configuration, on which I tested this firewall and). Performance can especially suffer if someone decides to use local security and web control, because after all, this firewall itself is quite a heavy thing, let alone in its entirety.. Although I won’t say so because everything works quickly for me, smooth and comfortable.

Afterword

To the question whether to ask it or not, I will answer yes, but in general, despite the fact that the overall impression is quite pleasant, I still have some kind of feeling that the program is cumbersome and overstuffed, and therefore, it is possible that the free version, where there is only one A firewall, in terms of a home solution, would be a much more competent and adequate choice because the pro version, in my opinion, is still closer to the server version than to the home version, and closer, I think, both in the number of settings and in the number of functions.. Well, the last thing is the price.. It does bite.

That's probably all.

This is, please note, a completely independent opinion...

However, opinion is opinion, and as usual, it’s up to you to decide;)

  1. Hello admin, please explain why you need it operating system firewall, what functions does it perform? I have it installed on my laptop, which I installed according to your article. I have no complaints about the work of the antivirus, but the only thing that confuses me is that it is disabled in free version"Pandas" firewall. My friends also ask me: Does my antivirus have a firewall? So, I don’t even know what it is. If I need it, where can I download it and how can I install it?
  2. Salute to everyone! Question - I use it ESET antivirus NOD32 Smart Security 7, which has its own firewall. Should I install the second best firewall in the world, Outpost Firewall Pro, to strengthen Windows protection?

Administrator's note: To protect your computer from viruses, spyware and other malware, your computer must have both an antivirus and a firewall, also known as a firewall. And if the basic functions of the first are known to many, then not everyone knows about the role of the firewall.

Why do you need a firewall on your computer?

Firewall, aka firewall- This special program, which protects against a certain type of malware aimed at gaining access to a computer via the Internet or local network. As a rule, these are network worms and attacks by malicious hackers. To do this, the firewall checks data coming from the Internet or over a local network, then makes a decision - either block this data or allow its transmission to the computer.

  • Friends, you are asking why a firewall is needed! Look at any anti-virus program, it is no longer one program (as it was just recently), but several powerful tools combined into one with multi-level protection, and even with cloud technologies: HIPS (proactive protection), advanced heuristics, firewall, protection against phishing and vulnerabilities, antispam, parental control and God knows what else will be added soon. All this is forced by the dangers that await us on the Internet, and the very first blow you take is none other than our firewall!

Windows OS, starting with version XP SP2, is equipped with a standard firewall, it is called “Windows Firewall”. But before Microsoft introduced this functionality, a computer could easily become infected with a network worm, even though an antivirus was installed on the system.

The fact is that an antivirus is a diagnostician and a healer; it can determine the presence of malware on a computer and cure the system by isolating infected files. Alas, an antivirus cannot protect against a recurrence of the disease—against the re-infiltration of malware. But a firewall can do this. The only “but” is that the firewall is not able to protect the user when he himself opens access to his data on the home or corporate network.

As is the case with many regular programs and Windows services, the problem with the minimalism of their settings and functionality is solved by third-party developers, but in their software products. And the standard Windows firewall can be replaced with any third-party one. Unlike the standard Windows firewall, which runs in background and protects against network threats “silently”, without informing the user about it, most third-party firewall programs will report almost every step they take with software notifications. Naturally, this is not the main advantage of third-party firewalls over the standard Windows firewall. The advantage is the ability to flexibly configure security - from basic protection to enhanced protection, where almost every action on the computer will require user permission.

  • As is the case with antiviruses, only one firewall should be running on the computer - either standard or third-party - so that there is no software conflict. When installing a third-party firewall, the standard Windows firewall is disabled automatically.
  • The Outpost Firewall Pro firewall works with a large number of antiviruses and you can install it for free antivirus programs: , but it makes no sense to install it to help such antivirus monsters as Kaspersky Internet Security, since they have their own powerful firewall.

Why Outpost Firewall Pro?

Outpost Firewall Pro is comprehensive, complete Internet protection. The program monitors network traffic - both incoming and outgoing - in order to identify network threats and prevent leakage of user data from the computer. Outpost Firewall Pro monitors the behavior of programs installed on your computer, blocking the launch of suspicious processes.

Outpost Firewall Pro has essentially the same functionality as many antiviruses. While rare antiviruses have an advanced firewall. The antivirus functionality in Outpost Firewall Pro is called proactive protection. Proactive protection blocks the launch of Trojans, spyware and other malware.

Some antivirus products have convinced users that any security software is necessarily a powerful devourer of system resources. This is not the case with Outpost Firewall Pro. The program uses system resources sparingly and will not slow down the system on low-power computer devices.

Outpost Firewall Pro, like anti-virus products, will automatically load at system startup and protect your computer at all times.

You can download a trial version of Outpost Firewall Pro, which you can use completely free for 30 days, on the developer’s website:

Let's consider more detailed installation, configuration and functionality of the Outpost Firewall Pro program.

Installing Outpost Firewall Pro

Download the program installation file and run it.

In the language selection window, Russian is preinstalled, click “Ok”.

You will be greeted by the program installation wizard.

In the next window you need to agree to the license agreement.

If you already have antivirus software installed on your computer, in the next window you will see that Outpost Firewall Pro makes sure that there are no program conflicts.

Note: It will not be possible to pair the Avira antivirus with the Outpost Firewall Pro firewall and they will not work together, but I want to say that it gets along well with the Avira antivirus.

Having gotten rid of the antivirus, at this stage of the Outpost Firewall Pro installation we will see that the wizard offers us a choice of regular and custom installation. Let's choose the usual one, it will be enough to protect against the most dangerous methods of malware entering your computer. However, any of the preset parameters can be changed in the future in the program settings.

The program will install.

And it will ask you to restart your computer.

After restarting the computer, we will see the program icon in the system tray, and double-clicking on it will open the program window. Basic information will be presented here - working protection components, time last update how many days can I use the free one? trial version and so on.

You will experience the full operation of the program only after launching the programs installed on your computer. Almost everything third party programs Outpost Firewall Pro will paranoidly recognize them as suspicious and ask for your permission to launch them. Fortunately, you will only need to allow programs to run once for each. In the future, Outpost Firewall Pro will remember the permission for each of them as a rule for execution. This is the so-called auto-learning mode of the program - it learns from you to trust certain programs that you run on the computer.

It's better to be safe than sorry - this is probably what the developers of Outpost Firewall Pro thought, since the firewall will detect even your attempt to switch to full-screen mode and ask whether you want to be protected while the software is running in full screen.

Overview of individual functionality

Let's see what functionality is provided in Outpost Firewall Pro.

The “Firewall” tab displays data on active processes - the number of open connections, as well as the amount of data received and sent.

Double-clicking on the active process will open a window where you can more flexibly configure the firewall's behavior in relation to this process.

In the “Tools” tab, you can view information on blocked attacks, used ports, running applications that use the Internet connection, etc.

In the “Update” tab, you can manually start the program update, if required.

Help on how to work with the program and an option for resolving a license issue are located in the “Help” tab. Also here you can follow the link to the official website of the program, where information about the creation is provided boot disk(Live Disc) with software from the developer company Agnitum.

Let's look at Outpost Firewall Pro settings using the example of setting parameters for enhanced protection computer.

Outpost Firewall Pro Settings

Go to the “Settings” tab of the program and click the “Advanced settings” link.

A window with Outpost Firewall Pro advanced settings will open. Let's start from the very beginning - from the “General” section.

In the “Configuration” subsection, you can protect Outpost Firewall Pro from being disabled by hackers and network worms with a password.

If you do not want to provide the developer with information about what programs you use and what threats have been detected on your computer, you can opt out of this preset option in the “ImproveNet” subsection. Here you can also refuse to send suspicious files to the developer or configure automatic sending, if you don't want Outpost Firewall Pro to constantly nudge you and ask you about it.

In the “System and Software Protection” subsection, system and application protection is activated by default, so let’s go straight to the “Folder and File Protection” subsection. Here, accordingly, you can set the option to protect those files and folders that you especially value. Access to these folders will be denied to other computer users and, naturally, to malware.

In the “Protection of removable devices” subsection, you can, on the contrary, remove the blocking of application launches if, for example, you often launch programs and games from removable media– flash drive or external HDD.

Unfortunately, not every antivirus is compatible with Outpost Firewall Pro. True, and the presence of such a separate software product- rather a tribute to the habit that people have developed over the years. Proactive protection functionality and flexible settings Outpost Firewall Pro will provide your computer with immunity from online threats. Threats will be prevented, rather than constantly sought out and treated by antiviruses. You can periodically scan the system using free antivirus utilities - for example, or

However, it is recommended to do this with the treatment utilities of another antivirus product even if an antivirus is installed on the system - just to be more vigilant.

In this situation, owners of low-power computers will certainly feel the potential of freed up system resources, because the antivirus will not devour them.

Setting up Outpost Firewall Pro

Outpost Firewall Pro settings can be accessed by clicking the button of the same name. The main settings items match the names in the main program window (Fig. 4.6).

Rice. 4.6. Outpost Firewall Pro settings window

Let's look at the most commonly used settings and those that may be needed at the initial stage of work.

On the menu Are common select the interface language, download mode and game mode resolution, in which the firewall does not bother the user with messages. By checking the boxes, SmartScan technology and internal firewall protection are activated. By going to the submenu Configuration, you can protect the settings with a password, save and restore the configuration. The update schedule is indicated in subparagraph Update. After installation, updates are checked hourly. This can be changed if necessary.

On the menu Firewall The firewall operation mode is configured in normal, background and game mode. During installation, Outpost Firewall Pro analyzes network settings, and local networks that are safe from his point of view are included in the subparagraph LAN Settings. By default, any communication with such networks is allowed. If necessary, here you can change the list of trusted networks, individual IP addresses and domains. Check box Fiduciary next to the address will allow all connections; to allow connections to shared files or directories via the NetBIOS protocol, check the box of the same name. Module Attack detector, the settings of which are located in the corresponding menu (Fig. 4.7), adds functions that are usually not typical of classic firewalls: detection and prevention of computer attacks from the local network and the Internet. The module scans incoming data for signatures of known attacks, and also analyzes scanning attempts and attacks aimed at denial of service (DoS - Denial of Service), and other, including unknown, network attacks.

Rice. 4.7. Attack Detector module settings

Advice

If your computer has network system detection and reflection of attacks, the Attack Detector module should be disabled by unchecking the corresponding box.

In field Alarm level the alarm level and actions of the module when an attack is detected are configured. Using the slider, you can select one of three alarm levels: Short, Optimal And Maximum, which differ in their response to some benign types of attacks. The latter provides the most high level protection, however, will issue a large number of warnings. By pressing the button Settings, you can specify what types of attacks Outpost Firewall should detect and prevent. On the tab Ethernet configures protection against some attacks specific to Ethernet and Wi-Fi networks. In particular, ARP filtering should be enabled here to protect against attackers spoofing the IP address. In area Ethernet attacks the module's reaction to such attacks is configured. On the tab Additionally you can edit the list of attacks that the module should detect and prevent. Each attack has short description, but it is recommended to disable something only if you know exactly what you are doing. By pressing the button Vulnerable ports, you can specify all the port numbers that require special attention. Here you can enter the port numbers traditionally used by Trojans and programs remote control computer. Check box Block the attacker for ... minutes allows you to set the period of time for which the IP address of the attacking node will be blocked, that is, no one will be able to connect to the protected computer from this address. Additional checkbox Block the attacker's subnet allows you to protect yourself in case an attacker wants to change the IP address (for example, when reconnecting via a modem connection, you can get a different IP address). To receive alerts when attacks are detected, select the checkboxes Play a sound alert when attacks are detected And Show visual alert when attacks are detected. To ensure that trusted nodes are not blocked by the attack detector, they should be specified in the field Exceptions– all packets sent by them will not be considered malicious.

Module setup Local Security similar to that described above. Using the slider, depending on the nature of the current work, one of four security levels is set - from Short, in which only requests are controlled network access from modified executable files, to Maximum, the activation of which enables maximum system protection. By pressing the button Settings, you can specify which actions, events, and components this module should monitor. You should only use this option if problems arise or if you know exactly what you want to achieve. In most cases it is more convenient to use the slider Security level. Applications that may be called by other programs can be listed Notable Applications, and configure control rules individually in the list Anti-Leak Control Exceptions. To do this, click the button of the same name and specify the path to the executable file. Module Local Security will not control their actions and bother the user with requests.

On the tab Anti-spy Enables or disables the spyware control module and the configuration of alerts and exceptions. Check box Check for spyware when starting a program will allow checking of everyone running programs after starting Outpost Firewall Pro. If the scan loads the system, you can select the checkbox Run specified jobs with low priority. In subparagraph Profiles and schedule system check profiles and automatic check jobs at specified times are configured. When setting up a scan profile, you can specify which system objects and partitions hard drive should be checked, as well as checking certain types of files and archives. Using a drop-down list Choose an action Sets the default action for detected malicious objects. Check box Skip files larger than: ... MB allows you to set the maximum size of scanned files. On the tab Mail scanner the attachment verification mode is configured in emails. If you are already checking your email antivirus program, you can disable this check by checking the box Disable attachment filter. The remaining items allow you to rename attachments from specified extensions or quarantine them.

Tab Web control contains settings for the module of the same name. Use the slider to select the level of web control. At the lowest Lightweight Only advertising based on keywords is blocked, interactive elements are allowed. Although interactive elements were originally designed to simplify user interaction, they can be exploited by hackers. When setting the level Optimal Some dangerous interactive elements are blocked. By pressing the button Settings, you can specify which specific elements to block or allow: ActiveX and Visual Basic scripts, Java applications and scripts, Cookies, pop-ups, external interactive elements, hidden frames, animations and referrers.

Like other information sources, many Internet resources exist thanks to advertising. Some sites abuse banners, which are images of different sizes, which leads to slower loading times. In addition, a user who pays per megabyte loses valuable traffic. Disabling the display of pictures only partially solves the problem.

Note

It is generally accepted that banners slow down loading due to their size, which sometimes exceeds the size of the information itself, which is why the user downloaded the resource. That's not all: banners are loaded using scripts that generate the address dynamically, but most often from other sites, so in some cases the user is forced to wait until the site is found and the information he then sees is determined.

When setting the slider to level Maximum Ads can be blocked by size. However, active content is used on many resources today, and without its activation, full-fledged work is impossible. Such sites can be added to the tab Exceptions. On the tab Personal data blocking the transfer of personal data is configured, for example, an attempt to transfer a credit card number. By setting various parameters, you can automatically replace personal information with asterisks or block the transmission of such packets. However, if you work with online stores and other resources that require such information, add them to the menu Exceptions. You can completely block known malicious sites and configure ad blocking by keywords in the subsection Advertising and websites. On the tab By keywords you can specify a list keywords, if matched in HTML tags IMG SRC= And AHREF= their download will be blocked. By pressing the button Download or Save, you can download a list obtained from another computer, or save such a list for later use on other systems. Tab To size contains a list of picture sizes that, if matched in the HTML tag A the drawing will be blocked. To add a banner size that is not in the list, enter its data in the fields Width And Height and press the button Add.

This text is an introductory fragment.