- Programs List
- The Programs list contains all applications registered and controlled by Windows7FirewallControl. The list displays the registered application names and network permissions set to the applications.
- All the operations with the listed programs are performed via the toolbar, right-clicking the list or hotkeys (see the menu for the hotkey assistance). The applications can be inserted, deleted and/or edited anytime at your option.
- The Filter field allows displaying a subset of the applications by name. If typed letter set matches an application name the application is displayed.
- Edit Application Access
- If an unlisted application requires network access or a listed application network permissions is edited, the Edit Application dialog is displayed and allows setting/changing the application network permissions, the security zone for the application. Choosing "EnableALL" allows the application access in the both directions (incoming and outgoing) unrestrictedly; DisableAll prohibits the network access; IncomingOnly/OutgoingOnly allows access only in the specified direction etc. Plus version includes huge set of predefined security zones.
- The common approach of network protection supposes minimal application network access allowed. So unknown/unrequired applications network access attempts are to be blocked. User level network active applications (not system services/servers) require outgoing access allowed only usually, therefore the best permission for them is OutgoingOnly, for instance. Plus version advises the most suitable zone on the initial application network access attempt automatically.
Some of the options are not available in the Free Edition
- The application icon in the Programs list can be adjusted by clicking the arrow button next to the current application's icon.
- The User field allows the security zone to the application for a selected user only (Network/Cloud Edition)
- Four customizable buttons allows choosing a "most popular" security zone to be applied by a single click
- "Disable 'Blocked Notifications' Balloon" suppresses displaying the blocking events for the particular application.
- The Zone combo box lists all the available zones from the Zones repository (the Zones tab). "Show advised/recommended zones only" limits the list with the set of most usable zones. Otherwise, the choice may not be easy, the list of predefined zones is long typically.
The Free Edition offers four predefined zones only; EnableAll, DisableAll, OutgoingOnly and IncomingOnly.
- "Apply" applies a chosen zone to the application.
- "Apply Once" applies the same for current application launch. After 20 secs the applications is exited, the application listing will be removed from the Programs list automatically.
- "Create specific rule" helps to create a unique rule for the application basing in the current actibity detected (Plus or Network/Cloud version only). So if the application is blocked with attempt to connect with 18.104.22.168 port 80 (for instance), you can create (and apply to the application) a permission to access 98.139.180.x any port, 98.139.180.x port 80 only or any aliress port 80 accordignly and corresponidng to the access attempt direction (incoming or outgoing).
- "Check AV hooks" helps to detect presence of online antivirus monitoring (if any). The monitoring typpically shifts the expectations of the traffic path. See F.A.Q for the details.
- "Allow in Mode: Expensive/Insecure Connection" marks the application to follow the zone set in "Mode: Expensive/Insecure Connection" (available via TrayIcon/RightClick menu) as well. All the other unmarked applications will not be allowed to access the network when the mode is set.
Note: Some applications may require the network access in both directions always (FTP clients, instant messengers etc)
- Extra information (Plus/Network version only)
- Program list additional columns:
The columns information is not updated immediately. 5-10 seconds delay should be expected for the column data actualization to save the computer resources.
- Run - shows whether application is running currently
- Ext - indicates application is configured for external/worldwide access via Port Forwarding
- Lim - indicates application is marked for "Mode:Expensive/Insecure Connection"
- "Show Advised/Recommended Zones Only" option state is not saved within the Edit Application dialog simplifying your choice in the short list of Advised/Recommended zones only.
- "Check AV hook" allows checking for whether the applications running on the PC are hooked by an antivirus (AV) online monitoring. AVs hook the traffic for the processing "inside" the PC while monitoring on-the-fly and locally. The real traffic is redirected to localhost (127.0.0.1) implicitly. The traffic is processed by the AV locally and then the traffic is issued to the internet in the name of the AV related service. So, applications request connection to localhost instead of a real public internet address from the firewall point. The real address is used only by AV service to operate with the real destination. Localhost is enabled by many predefined zones as the localhost communication is vital for many applications and safe almost anytime. Applications permitted to communicate with localhost and not permitted worldwide actually are able to connect to any address as the result of the hook. If the traffic is hooked by AV the permissions have to be set accordingly or the AV online monitoring has to be switched off.
- Remote Management (Plus/Network version only)
- Windows7FrewallControl is able to control other in-LAN/Network computers with Windows7FirewallControl installations remotely. You can select a computer to control from the drop down box at the bottom of the user interface. The list is populated automatically auto discovering the other network connected computers with the product installed. The discovery is based on the native Windows neighbors discovery. The discovery must not be disabled in Network/SharingCenter/AdvancedSharingSettings. Choosing a computer from the list you switch to control the selected computer. So there is a possibility to view/change the per-application network permissions, detect new applications, review the blocked events from the remote, edit the zone list and consisting zones of the remote installation, review the blocking statistics and alter Default and AppApplications zone of the remote computer. All the other operations relate to the local Windows7FirewallControl installation.
- All remote management operations are performed with DCOM (distributed COM). Windows7FirewallControl creates a special dedicated user account automatically. All remote operations are performed using this account exclusively. Since Windows is solely responsible for account processing, all the operations are as safe as any other remote access. The account permissions can be managed by native Windows tools easily.