Advanced firewall configuration / Configuring the firewall |
For more information, see Managing roles and sub-estates.
An application sometimes launches another hidden process to perform some network access for it.
Malicious applications can use this technique to evade firewalls: they launch a trusted application to access the network rather than doing so themselves.
To allow applications to launch hidden processes, follow these steps.