Firewall Module overview
When you first install a BullGuard security application you will be asked to restart the computer to complete the Firewall installation. That’s because the Firewall driver that provides the traffic filtering features can only be installed during the Windows start-up process.
Once you restarted the computer, you can start using the Firewall and configure it to match both your security requirements and, if needed, network characteristics.
The More Actions drop-down menu (...) includes the following options for quick access:
Logs: the section allows you to see all the connections that have been active on your computer in a real-time, up-to-date table.
Network Activity: the Network activity section shows you an overview of the current applications that are monitored by BullGuard and their adjacent network connection. The Firewall Logs section allows you to see all the connections that have been active on your computer in a real-time, up-to-date table.
Banned Hosts: this option allows you to manage the IPs for remote computers that you want to block from connecting or communicating with your computer.
Manage Rules: this option will open the Firewall application, advanced and ICMP rules in a new window where you can then edit them.
Settings: opens the section where you candefine how the Firewall engine manages the traffic on your computer.
A computer without an active Firewall is vulnerable to attacks within the first minute of being exposed to a public network, such as the internet.
For a long time viruses were the main concern in terms of computer security. That’s not the case anymore. That’s why only having regular Antivirus software installed is simply not enough to ensure a decent security level for the computer. It only takes one unprotected computer in a network for the security of every single computer in that network to be compromised, jeopardizing data privacy, system/network stability and personal information safety.
A firewall will prevent any unauthorized access to your computer and reject unrequested connections. Working hand in hand with the Antivirus software, it will drastically increase the security level of the computer. Unfortunately, as it’s practically impossible to ensure 100% safety for a computer connected to a network, it is vital to keep both the security applications and all other software applications on your computer up-to-date. Up-dated software and risk awareness make up the best way to minimize the risks of being connected and will greatly reduce the chances of being the target of network attacks.
There are two main types of firewalls:
Hardware Firewalls - Devices that are specifically built for network traffic filtering. They range from external devices to components that are incorporated within routers or even computer motherboards. They need specific software to be installed on your computer which will allow you to configure applications, port or protocol exceptions lists and customize the traffic filtering process.
Software Firewalls - Software installed on your computer that will perform the same traffic filtering as a Hardware Firewall.
The Firewall engine operates as a separate system service. That means that the Firewall can be operational even when the BullGuard application is not actually running, to secure the computer against network attacks. Thus, you will be protected against network attacks round-the-clock.
The BullGuard Firewall features a reliable ‘intrusion detection system’ designed to protect the computer against network attacks. This system provides protection against most types of network attacks and, when needed, can be altered to either increase or decrease the security level according to your needs. You can do this through the application management system, where you can also decide which programs may use the internet connection.
The Firewall has access to a ‘Known Applications’ database for most Windows processes and commonly-used applications. It will use this list to determine which applications it can trust and automatically allow them access to your Internet connection or in case they are on the suspected applications list, block them. You can adapt the Firewall to almost any type of network through advanced customizations.