Datasheet
44 z Norman Security Suite - User’s Guide
Copyright © 1990-2007 Norman ASA
To change an application’s configuration from allow to deny,
remove the check mark and click OK. Alternatively, insert a
check mark to allow a denied application access to the Internet.
Note that Terminate Application and Edit Associated Rule
only apply to entries “handled by rule”.
The Open Advanced Configuration option is only available
for rules handled by “advanced configuration”.
Useful facts about the Personal Firewall
You have seen that the Personal Firewall’s rule wizard automatically
can create rules for applications’ behavior with regard to accessing the
Internet. We have also established that there are different modes for
experienced and inexperienced users, and that the firewall features a
“server mode awareness”. You can create and change rules and view
details for traffic and port activity. In addition, Norman Personal
Firewall offers:
• Launcher protection, that detects attempts from an application
to launch itself through another application.
• Stealth launch protection, that uncovers malicious applications
attempting to access the Internet via other applications. The
Personal Firewall keeps track of all parent applications.
• Process hijacking protection, which prevents that malicious
applications hijack a “trusted” process for dll or thread
injection.
• Full stealth mode, that ensures that all ports on your computer
are completely invisible from the outside.
• Advanced svchost handling, where each svchost service has
separate rules rather than one general rule to cover the
grouping of services that each Svchost.exe session can contain.
• Anti-pharming, implemented through protection of the HOSTS
file and therefore eliminating the most common pharming
attack method.










