User manual

Reference: Configuration options
Avira Professional Security - User Manual (Status: 14 Dec. 2012) 138
Column
Description
Application
Name of the application.
Active
Connections
Number of active connections opened by the application.
Action
Shows the action that the Avira FireWall will automatically take when the
application is using the network, whatever the network usage type is.
If you choose Basic in the Filtering column, you can click the link to
select another action type. The values are Ask, Allow, or Deny.
If you choose Advanced in the Filtering column, the Rules action type is
displayed. The Rules link opens the Advanced application rules
window, in which you can enter specific rules for the application.
Filtering
Shows the type of filtering. You can select another type of filtering by
clicking the link.
Basic: In the case of simple filtering, the specified action is carried out on
all network activities performed by the software application.
Advanced: With this type of filtering, the rules that were added to the
extended configuration are applied.
If you want to create specific rules for an application, select the Advanced entry
under Filtering.
The Rules entry is then displayed in the Action column.
Click on Rules to open the window for creating specific application rules.
Specified application rules in the advanced configuration
Using the specified application rules, you can allow or deny specified data traffic for the
application or you can allow or deny passive listening to individual ports. The following
options are available:
Allow/ Deny Code injection
Code injection is a technique for introducing code into the address space of another
process to execute actions, forcing this process to load a dynamic link library (DLL).
Code injection is used by malware, amongst other things, to execute code under cover
of another program. In this way, access to the Internet in front of the FireWall can be
hidden. In default mode, code injection is enabled for all signed applications.