How To Add An Exception To The Firewall

Table of contents:

How To Add An Exception To The Firewall
How To Add An Exception To The Firewall

Video: How To Add An Exception To The Firewall

Video: How To Add An Exception To The Firewall
Video: How to add an exception to your windows firewall 2024, May
Anonim

A firewall, capable of assigning protection criteria, is designed to control incoming traffic to a computer from both external and local networks. Properly configured firewall filters will protect your computer from unwanted requests to it.

How to add an exception to the firewall
How to add an exception to the firewall

Instructions

Step 1

The firewall is in any operating system by default. Its icon can be found in the lower right corner. If it is not there, then turn it on. To do this, go to the Start menu, select the Control Panel tab and look for the Windows Firewall option. The action "Enable" should be indicated in the window that opens.

Step 2

To add exceptions, go to the "Exceptions" tab. In the window that opens, you will see a list with the option to check the boxes to allow access to the computer. To clarify the connection options, go to the "Advanced" tab and put a checkmark in front of the required parameter.

Step 3

In order to add programs to the exclusion, run the application, and a security window will pop up in which you select an action with the application: "Block", "Unblock" or "Postpone selection until next time."

Step 4

Use an alternative method. To do this, go to the "Exceptions" tab of the firewall menu and select the "Add program" button. A list of default programs will appear in the window that opens. If you need to add another application, specify the path to the executable file (.exe), then click OK.

Step 5

If you need to open ports, go to the "Exceptions" menu and select the "Add port" button. Next, enter the protocol with the port number and a brief description of allowing access to it.

Step 6

To add IP addresses to exclusions, click on the "Change area" button and in the window that appears, select the required address filtering parameter or configure the "Special list".

Step 7

You can also take advantage of additional features. For example, the Security Logging option allows you to track all actions that occur when protection is enabled. When you click on the "Default Settings" button, all settings will be reset to default. By following the instructions described above, you activate additional protection of your computer against unexpected attacks on the information contained in it.

Recommended: