Add and trust an application

If you use role-based administration:

  • You must have the Policy setting - firewall right to configure a firewall policy.
  • You cannot edit a policy if it is applied outside your active sub-estate.

For more information, see Managing roles and sub-estates.

Trusted applications are allowed full and unconditional network access, including access to the internet.

To add an application to the firewall policy and trust it:

  1. On the Operational mode page of the Firewall Policy wizard, click Trust.
    The Firewall Policy dialog box appears.
  2. Click Add.
    The Firewall policy - Add trusted application dialog box appears.
  3. In the Search period field, click the drop-down arrow and select the period for which you want to display application events.

    You can either select a fixed period, for example, Within 24 hours, or select Custom and specify your own time period by selecting the starting and ending dates and times.

  4. If you want to view application events of a certain type, in the Event type field, click the drop-down arrow and select the event type.
  5. If you want to view application events for a certain file, in the File name field, enter the file name.

    If you leave this field empty, application events for all files will be displayed.

    You can use wildcards in this field. Use ? for any single character and * for any string of characters.

  6. Click Search to display a list of application events.
  7. Select an application event, and then click OK.

The application is added to the firewall policy and marked as Trusted.