In the Rule name field enter the name of the edited rule.
The name of the rule, regardless of the case of characters, must not match the reserved names All, ICMPv4, and ICMPv6; it must be unique in the list of all rules for inbound network connections.
In the Rule action list, select one of the options:
Allow.If this option is selected, the application allows incoming network connections for the application.
Block. If this option is selected, the application blocks incoming network connections for the application.
In the Application path field, manually or by using the Browse button, specify the path to the executable file of the application for which you are configuring the rule.
In the Rule action field, specify network addresses. The application monitors incoming connections from the specified network addresses in accordance with the rule settings.
You can only use IPv4 addresses.
Click the OK button to save the rule.
Click the Add button on the Ports tab.
The Firewall rule for ports window opens.
Configure the rule settings:
In the Rule name field enter the name of the edited rule.
In the Rule action list, select one of the options:
Allow.If this option is selected, the application allows incoming network connections for the ports.
Block. If this option is selected, the application blocks incoming network connections for the ports.
For inbound network connections, specify a port or port range for the local device.
For outgoing network connections, specify a port or port range for remote devices.
The available values for the port number are 1–65535.
The available port ranges are 1–10, 20–30000, and 1–65535.
Windows XP does not support port ranges. Therefore, for devices in the rule scope that run Windows XP, the application applies the rule only to the first port of the specified range.
Select the type of protocol (TCP / UDP) for which the application will control incoming connections.
In the Rule action field, specify network addresses. The application monitors incoming connections from the specified network addresses in accordance with the rule settings.
You can only use IPv4 addresses.
Click the OK button to save the rule.
In the Firewall rules for inbound connections window, click the OK button.
Click the Outbound connections link in the details pane of the Firewall Management node.
The Firewall rules for outbound connections window opens.
In the Rule name field enter the name of the edited rule.
The name of the rule, regardless of the case of characters, must not match the reserved names All, ICMPv4, and ICMPv6; it must be unique in the list of all rules for outbound network connections.
In the Rule action list, select one of the options:
Allow.If this option is selected, the application allows outgoing network connections for the application.
Block. If this option is selected, the application blocks outgoing network connections for the application.
In the Application path field, manually or by using the Browse button, specify the path to the executable file of the application for which you are configuring the rule.
In the Rule action field, specify network addresses. The application monitors outgoing connections to the specified network addresses in accordance with the rule settings.
You can only use IPv4 addresses.
Click the OK button to save the rule.
Click the Add button on the Ports tab.
The Firewall rule for ports window opens.
Configure the rule settings:
In the Rule name field enter the name of the edited rule.
In the Rule action list, select one of the options:
Allow.If this option is selected, the application allows outgoing network connections for the ports.
Block. If this option is selected, the application blocks outgoing network connections for the ports.
Select the type of protocol (TCP / UDP) for which the application will control outgoing connections.
In the Rule action field, specify network addresses. The application monitors outgoing connections to the specified network addresses in accordance with the rule settings.
You can only use IPv4 addresses.
Click the OK button to save the rule.
In the Firewall rules for outbound connections window, click the OK button.
Kaspersky Embedded Systems Security for Windows applies the new settings to the running task. The date and time when the task settings were changed are saved in the system audit log.