The OfficeScan firewall
uses policies and profiles to organize and customize methods for
protecting networked computers.
With Active Directory integration and role-based administration,
each user role, depending on the permission, can create, configure,
or delete policies and profiles for specific domains.
|
Tip
Multiple firewall installations on the same
computer may produce unexpected results. Consider uninstalling other
software-based firewall applications on OfficeScan clients before
deploying and enabling the OfficeScan firewall.
|
The
following steps are necessary to successfully use the
OfficeScan firewall:
-
Create a policy. The policy allows you to select a security
level that blocks or allows traffic on networked computers and enables
firewall features.
-
Add exceptions to the policy. Exceptions allow OfficeScan clients to
deviate from a policy. With exceptions, you can specify clients, and allow
or block certain types of traffic, despite the security level setting
in the policy. For example, block all traffic for a set of clients in a policy,
but create an exception that allows HTTP traffic so clients can access
a web server.
-
Create and assign profiles to OfficeScan clients.
A firewall profile includes a set of client attributes
and is associated with a policy. When a client matches
the attributes specified in the profile, the associated policy is
triggered.