Firewall Policies and Profiles Parent topic

The OfficeScan firewall uses policies and profiles to organize and customize methods for protecting networked computers.
With Active Directory integration and role-based administration, each user role, depending on the permission, can create, configure, or delete policies and profiles for specific domains.
Tip
Tip
Multiple firewall installations on the same computer may produce unexpected results. Consider uninstalling other software-based firewall applications on OfficeScan clients before deploying and enabling the OfficeScan firewall.
The following steps are necessary to successfully use the OfficeScan firewall:
  1. Create a policy. The policy allows you to select a security level that blocks or allows traffic on networked computers and enables firewall features.
  2. Add exceptions to the policy. Exceptions allow OfficeScan clients to deviate from a policy. With exceptions, you can specify clients, and allow or block certain types of traffic, despite the security level setting in the policy. For example, block all traffic for a set of clients in a policy, but create an exception that allows HTTP traffic so clients can access a web server.
  3. Create and assign profiles to OfficeScan clients. A firewall profile includes a set of client attributes and is associated with a policy. When a client matches the attributes specified in the profile, the associated policy is triggered.