User manual
61
AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.
Use complete profiles with predefined rules, according to your needs
Keep an archive of all defined profiles and settings
Switch profiles automatically when connecting to various networks, or using
various network adapters
10.6.2.Firewall Profiles
The Firewall allows you to define specific security rules based on whether your
computer is located in a domain, or it is a standalone computer, or even a notebook.
Each of these options requires a different level of protection, and the levels are
covered by the respective profiles. In short, a Firewall profile is a specific
configuration of Firewall component, and you can use a number of such predefined
configurations.
Available profiles
Allow all - a Firewall system profile that has been pre-set by the
manufacturer and is always present. When this profile is activated, all network
communication is allowed and no safety policy rules are applied, as if the
Firewall protection was switched off (i.e. all applications are allowed but
packets are still being checked - to completely disable any filtering you need
to disable Firewall). This system profile cannot be duplicated, deleted, and its
settings cannot be modified.
Block all - a Firewall system profile that has been pre-set by the
manufacturer and is always present. When this profile is activated, all network
communication is blocked, and the computer is neither accessible from outer
networks, nor can communicate outside. This system profile cannot be
duplicated, deleted, and its settings cannot be modified.
Custom profiles - profiles generated through the Firewall Configuration
Wizard. The maximum of three custom profiles can be generated through the
Wizard:
o
Standalone computer – suitable for common desktop home computers
connected directly to the Internet.
o
Computer in domain – suitable for computers in a local network, e.g.
school or corporate network. It is assumed that the network is protected
by some additional measures so that the security level can be lower than
for a standalone computer.