Managing firewall protection

Article:HOWTO55053  |  Created: 2011-06-29  |  Updated: 2011-12-16  |  Article URL
Article Type
How To


Managing firewall protection

The firewall allows the incoming network traffic and outgoing network traffic that you specify in firewall policy. The Symantec Endpoint Protection firewall policy contains rules and protection settings, most of which you can enable or disable and configure.

Table: Manage firewall protection describes ways in which you can manage your firewall protection. All of these tasks are optional.

Table: Manage firewall protection



Read about firewall protection

Before you configure your firewall protection, you should familiarize yourself with the firewall.

See How a firewall works.

See About the Symantec Endpoint Protection firewall.

Create a firewall policy

Symantec Endpoint Protection installs with a default firewall policy. You can modify the default policy or create new ones.

You must create a policy first before you configure firewall rules and firewall protection settings for that policy.

See Creating a firewall policy

See Enabling and disabling a firewall policy

Create and customize firewall rules

Firewall rules are the policy components that control how the firewall protects client computers from malicious attacks.

The default firewall policy contains default firewall rules. And when you create a new policy, Symantec Endpoint Protection provides default firewall rules. However, you can modify the default rules or create new ones.

See About firewall rules.

See Setting up firewall rules.

Enable firewall protection settings

After the firewall has completed certain operations, control is passed to a number of components. Each component is designed to perform a different type of packet analysis.

See Automatically allowing communications for essential network services.

See Automatically blocking connections to an attacking computer.

See Detecting potential attacks and spoofing attempts.

See Preventing stealth detection.

See Disabling the Windows firewall.

See Configuring peer-to-peer authentication.

Monitor firewall protection

Regularly monitor the firewall protection status on your computers.

See Monitoring endpoint protection.

See Running commands on the client computer from the console.

See Configuring firewall settings for mixed control.

See the knowledge base article Network Threat Protection Firewall Overview and Best Practices White Paper.

Legacy ID


Article URL

Terms of use for this information are found in Legal Notices