Operation Manual
Setting up Outpost Firewall
25
connection, depending on whether you are running Outpost in Rules Wizard or Block
Most mode.
Clicking the Preset button in the above dialog gives you choices that look like this:
The choices on the Preset list will very likely be added to as time goes on or otherwise
modified. This will be included in any updates of the Outpost Firewall software as was
covered earlier. For advanced information about rule creation, see
5.4 Creating Rules for
Applications.
3.6 Component Control
Not only does Outpost Personal Firewall monitor applications, but it also monitors the
components of each application. So, when a module of an application has changed and the
application is about to establish a connection, Outpost Firewall will ask you whether it
should be allowed. The purpose of this Component Control is to make sure components
are not fake or malicious. Some Trojan horses can be inserted as modules of legitimate
applications (for example, your browser is made up of many separate parts) and thus gain
the privileges needed to go online. Outpost Firewall allows you to set the desired
Component Control level
by clicking the Components button on the Applications tab of
the Options dialog window:










