User manual
52
Search for rootkits - since the rootkit scan is not an implicit part of the
Scan of the whole computer, you can run the rootkit scan directly from the
Anti-Rootkit interface using this button
Save changes - press this button to save all changes made in this interface
and to return to the default AVG user interface (components overview)
Cancel - press this button to return to the default AVG user interface
(components overview) without having saved any changes you made
10.4. Firewall
10.4.1. Firewall Principles
Firewall is a system that enforces an access control policy between two or more
networks by blocking/permitting traffic. Firewall contains a set of rules that protect
the internal network from attacks originating outside (typically from the Internet) and
controls all communication on every single network port. The communication is
evaluated according to the defined rules, and then either allowed or forbidden. If
Firewall recognizes any intrusion attempts, it “blocks” the attempt and does not allow
the intruder access to the computer.
Firewall is configured to allow or deny internal/external communication (both ways, in
or out) through defined ports, and for defined software applications. For example, the
firewall could be configured to only permit web data to flow in and out using Microsoft
Explorer. Any attempt to transmit web data by any other browser would be blocked.
Firewall protects your personally-identifiable information from being sent from your
computer without your permission. It controls how your computer exchanges data
with other computers on the Internet or local network. Within an organization, the
firewall also protects the single computer from attacks initiated by internal users on
other computers in the network.
Note: AVG Firewall is not intended for server platforms!
How does AVG Firewall work
In AVG, the Firewall component controls all traffic on every network port of your
computer. Based on the defined rules, the Firewall evaluates applications that are
either running on your computer (and want to connect to the Internet/local network),
or applications that approach your computer from outside trying to connect to your
PC. For each of these applications the Firewall then either allows or forbids the