Documentation FreeFirewall

Introduction

Free firewall is a full-featured professional firewall that protects against the threats of the Internet. Control every program on your computer by permit or deny access to the Internet. Free firewall notifies you when applications want to access the Internet in the background without your knowledge.

Use cases

Monitoring and control

Monitor the Internet access of any program running on your computer. Define rules that control Internet access individually for each program.

Protection against attackers

The software protects you against attackers from the Internet and the local network.

Privacy

When surfing the Internet you leave many traces. Various techniques can be used to track internet users and monitor their activities. The software protects you from tracking and monitoring on the Internet.

Setup

To set up the software on your computer, you must first download the installation file. You can find this on the website: FreeFirewall Download.
Once you have downloaded the installation file, start it. After the installation is completed, a shortcut appears on your desktop. Start the software.

User interface

After starting the application, the user interface of the software appears.

Updating the software

The software occasionally receives updates that provide new features or fix bugs.. You can check on the product page of the software whether a newer version is available or when an update appears. For each new program version, the change log is used to determine whether it is downwards compatible with the previous version. Ensure that you are installing only updates that are backward compatible with your installed program version. Each update has its own stability label:

  • Beta: These program versions are still under development and have not been adequately tested. You should only install these program versions on a test device which you do not use productively.
  • Preview: These program versions have not yet been adequately tested. You should only install these program versions on a test device which you do not use productively.
  • Release: These program versions have been adequately tested and can be used on productive systems.
Note: Update the software on all devices simultaneously.

Incompatible updates

If you want to install a newer version of the program, which is not backward compatible with the existing one, you should do this as follows:

  1. Back up all your data from the existing installation to a secure disk.
  2. Note the configuration and settings of the existing installation.
  3. Uninstall the old program version. When uninstalling, select the complete uninstallation.
  4. Install the update.
  5. Configure the new installation with the recorded settings.
  6. Copy your old data to the cloud drive or to the synchronizing folder.

Update from version 1 to 2

If you want to upgrade from version 1 to 2, please follow the instructions in the section below: Incompatible updates

Applications

After setting up and starting the software, all running programs are displayed in the user interface.

Permissions

You can set permissions for each program individually.

Possible permissions are:

  • Ask for permission: Each time you access the Internet, the software displays an Internet access event that you approve or block.
  • Allow all: Every internet access is automatically approved by the firewall.
  • Deny all: Any Internet access is automatically blocked by the firewall.
  • Apply rules: Each Internet access is automatically decided on the basis of rules for this program. Rules can be created by the user.
Note: As soon as you change the permissions of programs, they are accepted by the program within 10 seconds.

Services

Similar to running programs, background services are also monitored. Individual authorizations can also be assigned for services.

Warning: Services provide important functions in the operating system. An incorrect configuration can cause problems accessing the network and the Internet.

Rules

In addition to allowing or prohibiting everything from two privilege levels, there is a more precise assignment of permissions by rules. Rules consist of an address and a port and an permission.

If a program accesses the network or the Internet, all the rules listed are checked until one matches the destination address. If a matching destination address is found, the respective permissions assigned to the rule are applied and processing ends.
If none of the specified rules match the destination address, the last rule will be applied. The last rule can have the following values:

  • Ask for permission: If no match is found after the above rules have been processed, the software displays an Internet access event that you approve or block.
  • Allow all: If no match was found after completing the above rules, Internet access is automatically approved by the firewall.
  • Deny all: If no match was found after the above rules have been processed, Internet access is automatically blocked by the firewall.
  • Apply selected zone rules: If no match was found after processing the above rules, then rules of the selected zone are checked until a match is found.

Zones

Zones are an extension of the rule concept. Rules provide a fine-grained assignment of permissions to a particular program. Since many programs should have similar permissions, it makes sense not to assign these rules individually to each program, but to create a zone. In this zone all rules are listed. Then the zone can be assigned to one or more programs.

FAQs

Often, the same questions are asked repeatedly. At this point we want to give you the most common answers.

Should I disable the Windows Firewall or Defender Firewall?

No. Our firewall works independently and in parallel to other products. You do not have to disable the Windows Firewall or the Defender Firewall.

2019 © Evorim. All Rights Reserved. Privacy | GTC | Disclaimer | Imprint