Operation Manual

Setting up Outpost Firewall
30
To individually set rules for suspicious actions from a particular application (for example,
to allow a specific application to modify the memory of other processes), click the
Exclusions tab. Click Add and browse to the application’s executable file. After clicking
Open, you will see the application in the list and will be able to specify its individual anti-
leak settings. To change the setting for the selected action, click the link in the Action
column next to the action name. The available actions are the same as for the global system
settings described above. Besides, you can set to inherit global setting for the action,
specifying the Use Global setting.
Click OK to save your settings.
Note: Any actions that are other instances of the same process are allowed. For example,
Internet Explorer can control other Internet Explorer windows.
Note: If you completely trust an application and want to allow it to perform all the listed
actions, right-click the application in the list on the Application tab and select Ignore
Anti-Leak Control. The application will be added to the Anti-Leak exclusions list with all
actions set to Allow.