Firewall (Windows computers)
Advanced EPDR monitors the communications sent and received by each computer on the network, blocking all traffic that matches the rules defined by you. This module is compatible with both IPv6 and IPv4 and includes multiple tools for filtering network traffic:
-
System rules: Describe communication characteristics (ports, IP addresses, protocols, etc.), allowing or denying the data flows that match the configured rules.
-
Program rules: Allow or prevent the programs installed on users’ computers from communicating with other computers.
-
Intrusion detection system: Detects and rejects malformed traffic patterns that can affect the security or performance of protected computers.
Operating mode
This is defined through the option Let computer users configure the firewall:
-
Enabled (user-mode or self-managed firewall): Enables users to manage the firewall protection from the local console installed on their computers.
-
Disabled (administrator-mode firewall): You configure the firewall protection of all computers on the network through settings profiles.
Network types
Laptops and mobile devices can connect to networks with different security levels, from public Wi-Fi networks, such as those in Internet cafés, to managed and limited-access networks, such as those found in companies. You have two options to set the default behavior of the firewall protection: manually select the type of network that the computers in the configured profile usually connect to, or let Advanced EPDR select the most appropriate network type.
Network type | Description |
---|---|
Networks in public places such as airports, Internet cafés, and universities. Computers are not visible to other users on the network and some programs have limited access to the network. Limitations must be established on the way protected computers are used and accessed, especially with regard to file, resource, and directory sharing. Cytomic rules are enabled or disabled according to the administrator’s criteria. |
|
Home or office networks when you know and trust the other users and devices on the network. Computers are visible to other computers and devices on the network. Cytomic rules are not applied, so there are no restrictions on sharing files, resources, or directories. |
|
Detect automatically |
The network type (public or trusted) is selected automatically based on the rules you specify. Click the link Configure rules to determine when a computer is connected to a trusted network. |
Advanced EPDR behaves differently and applies different predetermined rules automatically depending on the type of network selected. These predetermined rules are referred to as ‘Cytomic rules’ in the Program rules and Connection rules sections.
Each network interface on a computer has a specific type of network assigned to it. Computers with multiple network interfaces can have different network types assigned, and different firewall rules for each network interface.
Configuring rules for trusted access
Advanced EPDR enables you to add and configure rules to determine whether a computer is connected to a trusted network. If none of these conditions is met, then the network type selected for the network interface is public network.
To be considered on a trusted network, the computer must be able to resolve a domain previously defined on an internal DNS server. If the computer can connect to the DNS server and resolve the configured domain, then it is connected to the company network, and the firewall assumes the computer is connected to a trusted network.
Next is a configuration example:
-
In this example, the organization’s primary DNS zone is "mycompany.com".
-
Add a Type A record with the "firewallcriterion” name to the primary zone of your organization’s internal DNS server (“mycompany.com”). You do not need to specify an IP address because it is not used to validate the criterion.
-
Based on these settings, "firewallcriterion.mycompany.com" is the domain that Advanced EPDR tries to resolve in order to check that it is connected to the company’s network.
-
Restart the DNS server if required and make sure "firewallcriterion.mycompany.com" is resolved successfully from all segments of the internal network with the tools nslookup, dig, or host.
-
From the Advanced EPDR console, click the link Configure rules to determine when a computer is connected to a trusted network. A dialog box opens. Enter the following data:
-
Criterion name: Type a name for the rule you want to add.. For example “myDNScriterion”.
-
DNS server: Type the IP address of the DNS server in your company network that can resolve DNS requests.
-
Domain: Type the domain to send to the DNS server for resolution. Enter “firewallcriterion.mycompany.com”.
-
-
Click OK and Save. Click Save again.
-
After the criterion has been configured and applied, the computer tries to resolve the "firewallcriterion.mycompany.com" domain on the specified DNS server every time an event occurs on the network interface (connect, disconnect, IP address change, etc.). If DNS resolution succeeds, the settings assigned to the trusted network are assigned to the network interface used.
Program rules
In this section you can configure program rules to control which programs can communicate with the local network and Internet.
To build an effective protection strategy, follow these steps in the order listed:
-
Set the default action.
Action | Description |
---|---|
Allow |
Implements a permissive strategy based on always accepting connections for all programs for which you have not configured a specific rule in step 3. This is the default, basic mode. |
Deny |
Implements a restrictive strategy based on always denying connections for all programs for which you have not configured a specific rule in step 3. This is an advanced mode, as it requires adding rules for every frequently used program. Otherwise, they will not be allowed to communicate, affecting their performance. |
-
Enable or disable Cytomic rules.
This only applies if the computer is connected to a public network.
-
Add rules to define the specific behavior of your applications.
You can change the order of the program rules, as well as adding, editing, or removing them by using the Up (1), Down (2), Add (3), Edit (4),and Delete (5) buttons on the right. Use the checkboxes (6) to select the rules you want to apply each action to.
Complete the following fields to create a rule:
-
Description: Type a description of the new rule.
-
Program: Select a program you want to configure connection options for.
-
Connections allowed for this program: Select an option to specify whether to allow or deny connections for the program:
Field | Description |
---|---|
Allow inbound and outbound connections |
The program can connect to the local network and Internet. Also, other programs or users can connect to it. There are certain types of programs that need these permissions to work correctly: file sharing programs, chat applications, Internet browsers, etc. |
Allow outbound connections |
The program can connect to the local network and Internet, but does not accept inbound connections from other users or applications. |
Allow inbound connections |
The program accepts connections from programs or users from the local network and Internet, but is not allowed to establish outbound connections. |
Deny all connections |
The program cannot connect to the local network or Internet. |
-
Advanced permissions: Specify parameters of the traffic you want to allow or deny.
Field | Description |
---|---|
Action |
Defines the action that Advanced EPDR takes when the examined traffic matches the rule.
|
Direction |
Sets the traffic direction for connection protocols such as TCP.
|
Zone |
Applies only if the zone matches the zone configured in Network types. Rules whose Zone is set to All are applied at all times irrespective of the network type configured in the Firewall settings. |
Establish the layer 3 protocol for the traffic generated by the program you want to control:
|
|
IP |
|
Connection rules
Connection rules define traditional TCP/IP traffic filtering. Advanced EPDR extracts the values of fields in the headers of each packet sent and received by protected computers and checks them against the predefined rules and any custom rules you create If the traffic matches any of the rules, the solution takes the specified action.
Connection rules affect the entire system (regardless of the process that manages them). They have priority over program rules that control the connection of programs to the Internet and local network.
To build an effective strategy to protect the network against dangerous and unwanted traffic, follow these steps in the order listed:
-
Specify the firewall’s default action in the Program rules section.
Action | Description |
---|---|
Allow |
Implements a permissive strategy based on always accepting all connections for which you have not configured a specific rule in step 3. This is the default, basic configuration mode: All connections for which there is not an existing rule are automatically accepted. |
Deny |
Implements a restrictive strategy based on always denying all connections for which you have not configured a specific rule in step 3. This is an advanced mode: All connections for which there is not an existing rule are automatically denied. |
-
Enable or disable Cytomic rules.
This only applies if the computer is connected to a public network.
-
Add rules that describe specific connections along with the associated action.
You can change the order of the firewall connection rules, as well as adding, editing, or removing them by using the Up (1), Down (2), Add (3), Edit (4), and Delete (5) buttons to their right. Use the checkboxes (6) to select the rules you want to apply each action to.
The order of the rules in the list is not random. They are applied in descending order. If you change the position of a rule, you also change its priority.
The following is a description of the fields found in a connection rule:
Field | Description |
---|---|
Name |
Type a name for the rule. |
Description |
Type a description of the traffic filtered by the rule. |
Direction |
Sets the traffic direction for connection protocols such as TCP.
|
Zone |
The rule only applies if the value specified here matches the network type configured in Network types. If you select All, then the rule applies at all times, regardless of the network type configured. |
Protocol |
Select the traffic protocol. The options vary for the protocol you select:
|
IP addresses |
Specify the source or target IP address of the traffic to control. You can enter multiple addresses, separated by commas. To specify a range, use a hyphen (-). From the drop-down menu, select if the IP addresses are IPv4 or IPv6. You cannot mix different types of IP addresses in the same rule. |
MAC addresses |
Specify the source or target MAC address of the traffic to control. |
The source and target MAC addresses included in packet headers are overwritten every time the traffic goes through a proxy, router, etc. The data packets reach their destination with the MAC address of the last device that handled the traffic.
Block intrusions
The intrusion detection system (IDS) enables you to detect and reject malformed traffic specially crafted to impact the security and performance of protected computers. This traffic can cause malfunction of user programs, lead to serious security issues, and allow remote execution of applications by hackers, data theft, etc.
The following is a description of the types of malformed traffic supported and the protection provided:
Do not block intrusions from the following IP addresses:
Enables you to exclude certain IP addresses and/or IP address ranges from the detections made by the firewall.