In the Rule name field enter the name of the edited rule.
The name of the rule, regardless of the case of characters, must not match the reserved names All, ICMPv4, and ICMPv6; it must be unique in the list of all rules for inbound network connections.
In the Rule action list, select one of the options:
Allow.If this option is selected, the application allows incoming network connections for the application.
Block. If this option is selected, the application blocks incoming network connections for the application.
In the Application path field, manually or by using the Browse button, specify the path to the executable file of the application for which you are configuring the rule.
In the Rule action field, specify network addresses. The application monitors incoming connections from the specified network addresses in accordance with the rule settings.
You can only use IPv4 addresses.
Click the OK button to save the rule.
Click the Add button on the Ports tab.
The Firewall rule for ports window opens.
Configure the rule settings:
In the Rule name field enter the name of the edited rule.
In the Rule action list, select one of the options:
Allow.If this option is selected, the application allows incoming network connections for the ports.
Block. If this option is selected, the application blocks incoming network connections for the ports.
For inbound network connections, specify a port or port range for the local device.
For outgoing network connections, specify a port or port range for remote devices.
The available values for the port number are 1–65535.
The available port ranges are 1–10, 20–30000, and 1–65535.
Windows XP does not support port ranges. Therefore, for devices in the rule scope that run Windows XP, the application applies the rule only to the first port of the specified range.
Select the type of protocol (TCP / UDP) for which the application will control incoming connections.
In the Rule action field, specify network addresses. The application monitors incoming connections from the specified network addresses in accordance with the rule settings.
You can only use IPv4 addresses.
Click the OK button to save the rule.
In the Firewall rules for inbound connections window, click the OK button.
On the General tab, in the Outbound connections block, click on the Rules list button.
The Firewall rules for outbound connections window opens.
In the Rule name field enter the name of the edited rule.
The name of the rule, regardless of the case of characters, must not match the reserved names All, ICMPv4, and ICMPv6; it must be unique in the list of all rules for outbound network connections.
In the Rule action list, select one of the options:
Allow.If this option is selected, the application allows outgoing network connections for the application.
Block. If this option is selected, the application blocks outgoing network connections for the application.
In the Application path field, manually or by using the Browse button, specify the path to the executable file of the application for which you are configuring the rule.
In the Rule action field, specify network addresses. The application monitors outgoing connections to the specified network addresses in accordance with the rule settings.
You can only use IPv4 addresses.
Click the OK button to save the rule.
Click the Add button on the Ports tab.
The Firewall rule for ports window opens.
Configure the rule settings:
In the Rule name field enter the name of the edited rule.
In the Rule action list, select one of the options:
Allow.If this option is selected, the application allows outgoing network connections for the ports.
Block. If this option is selected, the application blocks outgoing network connections for the ports.
Select the type of protocol (TCP / UDP) for which the application will control outgoing connections.
In the Rule action field, specify network addresses. The application monitors outgoing connections to the specified network addresses in accordance with the rule settings.
You can only use IPv4 addresses.
Click the OK button to save the rule.
In the Firewall rules for outbound connections window, click the OK button.
Click the OK button in the Firewall Management window.
Kaspersky Embedded Systems Security for Windows applies the new settings to the running task. The date and time when the settings were changed are saved in the system audit log.