Network Monitor is a tool designed for viewing information about the network activity of a user's computer in real time. This is convenient because you do not need to configure all the rule settings. Some Firewall settings will be inserted automatically from Network Monitor data. Network Monitor is available only in the application interface.
Configure the Firewall settings.
This lets you fine-tune the Firewall settings. You can create rules for any network activity, even if there is no network activity at the current time.
When creating network packet rules, remember that they have priority over network rules for applications.
In the main application window, click More Tools → Network Monitor.
Select the Network activity tab.
The Network activity tab shows all currently active network connections with the computer. Both outbound and inbound network connections are displayed.
In the context menu of a network connection, select Create packet rule.
This opens the network rule properties.
Set the Active status for the packet rule.
Manually enter the name of the network service in the Name field.
Configure the network rule settings (see the table below).
You can select a predefined rule template by clicking the Network rule template link. Rule templates describe the most frequently used network connections.
All network rule settings will be filled in automatically.
If you want the actions of the network rule to be reflected in the report, select the Log events check box.
Click the Save button.
The new network rule will be added to the list.
Use the Up / Down buttons to set the priority of the network rule.
In the lower part of the main application window, click the button.
In the application settings window, select Protection → Essential Threat Protection → Firewall.
Click the Packet rules button.
This opens the list of default network rules that are set by the Firewall.
Click the Add button.
This opens the network rule properties.
Set the Active status for the packet rule.
Manually enter the name of the network service in the Name field.
Configure the network rule settings (see the table below).
You can select a predefined rule template by clicking the Network rule template link. Rule templates describe the most frequently used network connections.
All network rule settings will be filled in automatically.
If you want the actions of the network rule to be reflected in the report, select the Log events check box.
Click the Save button.
The new network rule will be added to the list.
Use the Up / Down buttons to set the priority of the network rule.
Open the Kaspersky Security Center Administration Console.
In the Managed devices folder in the Administration Console tree, open the folder with the name of the administration group to which the relevant client computers belong.
In the workspace, select the Policies tab.
Select the necessary policy and double-click to open the policy properties.
In the policy window, select Essential Threat Protection → Firewall.
In the Firewall settings block, click the Settings button.
This opens the list of network packet rules and the list of application network rules.
Select the Network packet rules tab.
This opens the list of default network rules that are set by the Firewall.
Click the Add button.
This opens the packet rule properties.
Manually enter the name of the network service in the Name field.
Configure the network rule settings (see the table below).
You can select a predefined rule template by clicking the button. Rule templates describe the most frequently used network connections.
All network rule settings will be filled in automatically.
If you want the actions of the network rule to be reflected in the report, select the Log events check box.
Click the Save button.
The new network rule will be added to the list.
Use the Up / Down buttons to set the priority of the network rule.
Save your changes.
The Firewall will control network packets according to the rule. You can disable a packet rule from Firewall operation without deleting it from the list. To do so, clear the check box next to the object.
In the main window of Web Console, select Devices → Policies and profiles.
Click the name of the Kaspersky Endpoint Security policy.
The policy properties window opens.
Select the Application settings tab.
Select Essential Threat Protection → Firewall.
In the Firewall settings block, click the Network packet rules link.
This opens the list of default network rules that are set by the Firewall.
Click the Add button.
This opens the packet rule properties.
Manually enter the name of the network service in the Name field.
Configure the network rule settings (see the table below).
You can select a predefined rule template by clicking the Select template link. Rule templates describe the most frequently used network connections.
All network rule settings will be filled in automatically.
If you want the actions of the network rule to be reflected in the report, select the Log events check box.
Click the Save button.
The new network rule will be added to the list.
Use the Up / Down buttons to set the priority of the network rule.
Save your changes.
The Firewall will control network packets according to the rule. You can disable a packet rule from Firewall operation without deleting it from the list. Use the toggle in the Status column to enable or disable the packet rule.
Network packet rule settings
Parameter
Description
Action
Allow.
Block.
By application rules. If this option is selected, Firewall applies the application network rules to the network connection.
Protocol
Control network activity over the selected protocol: TCP, UDP, ICMP, ICMPv6, IGMP and GRE.
If ICMP or ICMPv6 is selected as the protocol, you can define the ICMP packet type and code.
If TCP or UDP is selected as the protocol type, you can specify the comma-delimited port numbers of the local and remote computers between which the connection is to be monitored.
Direction
Inbound (packet). Firewall applies the network rule to all inbound network packets.
Inbound. Firewall applies the network rule to all network packets sent via a connection that was initiated by a remote computer.
Inbound / Outbound. Firewall applies the network rule to both inbound and outbound network packets, regardless of whether the user's computer or a remote computer initiated the network connection.
Outbound (packet). Firewall applies the network rule to all outbound network packets.
Outbound. Firewall applies the network rule to all network packets sent via a connection that was initiated by the user's computer.
The TCP protocol establishes a connection. Use the Inbound, Outbound and Inbound/Outbound directions for TCP. All other protocols do not establish connections, but they send packets. For all other protocols, use the Inbound (packet), Outbound (packets) or Inbound/Outbound directions.
Network adapters
Network adapters that can send and/or receive network packets. Specifying the settings of network adapters makes it possible to differentiate between network packets sent or received by network adapters with identical IP addresses.
Time to live (TTL)
Restrict control of network packets based on their time to live (TTL).
Remote addresses
Network addresses of remote computers that can send and receive network packets. Firewall applies the network rule to the specified range of remote network addresses. You can include all IP addresses into a network rule, create a separate list of IP addresses, or select a subnetwork (Trusted networks, Local networks, Public networks).
Local addresses
Network addresses of computers that can send and receive network packets. Firewall applies a network rule to the specified range of local network addresses. You can include all IP addresses in a network rule or create a separate list of IP addresses.
Sometimes the local address cannot be obtained for applications. If this is the case, this parameter is ignored.