Rules represent a set of conditions used to meaningfully test all network connections and all actions assigned to these conditions. In personal firewall, you can define what action to take, if a connection defined by a rule is established.
To access the rule filtering setup, navigate to Advanced setup (F5) > Personal firewall > Rules and zones. To display the current configuration, click Setup in the Rule and zone editor section. If the personal firewall is set to automatic filtering mode, these settings are not available.
In the setup window, an overview of rules or zones is displayed (based on the currently selected tab). The window is divided into two sections. The upper section lists all rules in a shortened view. The lower section displays details about the rule currently selected in the upper section. At the very bottom are the buttons New, Edit, and Delete, which allow the user to configure rules.
If taking into account the direction of communication, connections can be divided into incoming and outgoing connections. Incoming connections are initiated by a remote computer attempting to establish connection with the local system. Outgoing connections work in the opposite way - the local side contacts a remote computer.
If a new unknown communication is detected, you must carefully consider whether to allow or deny it. Unsolicited, unsecured or totally unknown connections pose a security risk to the system. If such a connection is established, it is recommended that you pay particular attention to the remote side and the application attempting to connect to your computer. Many infiltrations try to obtain and send private data, or download other malicious applications to the host workstations. The personal firewall allows the user to detect and terminate such connections.