In the Firewall settings of a workstations and servers settings profile, you can configure WatchGuard Endpoint Security to enable a firewall on Windows computers.
When WatchGuard Endpoint Security detects malware or a suspicious file is defined by the WatchGuard anti-malware laboratory, WatchGuard Endpoint Security takes one of these actions:
- Known Malware Files When Disinfection Is Possible: Replaces the infected file with clean copy.
- Known Malware Files When Disinfection Is Not Possible: Makes a copy of the infected file and deletes the original file.
To configure Firewall settings:
- From the top navigation bar, select Settings.
- From the left pane, select Workstations and Servers.
- Select an existing security settings profile to edit, copy an existing profile, or in the upper-right corner of the page, click Add to create a new profile.
The Add Settings or Edit Settings page opens.
- Enter a Name and Description for the profile, if required.
- Select Firewall.
- To allows end users to manage firewall
protection from the web UI on their computers, enable the Let computer users configure the firewall toggle.
If this toggle is disabled, the administrator configures firewall protection of all computers on the network through security settings profiles.
- Select Enable the Firewall.
- From the drop-down list, select the network type that computers connect to.
For more information, see Firewall Settings – Network Types.
- Configure these settings, as required.
- Click Save.
- Select the profile and assign recipients, if required.
For more information, see Assign a Settings Profile.
Configure program rules to allow or prevent communication to and from programs installed on user computers.
To configure program rules:
- From the Take the Following Action if no Predefined Rule Is Found drop-down list, select the default action to take for traffic that does not match a predefined firewall rule (Allow or Deny).
- To enable predefined rules to deny remote administration of IIS and Remote Desktop, select the Enable WatchGuard Rules toggle.
- To add and configure custom program rules, click .
For more information, see Configure Program Rules (Windows computers).
Enable predefined rules to block and deny communication to and from programs installed on user computers.
To enable connection rules:
- Enable the Enable WatchGuard Rules toggle.
- To add and configure custom connection rules, click .
For more information, see Configure Connection Rules (Windows computers).
The intrusion detection system (IDS) allows administrators to detect and reject malformed traffic specially crafted to impact the security and performance of protected computers. This traffic can cause malfunction of user programs, lead to serious security issues, and allow remote execution of applications by hackers, data theft, etc.
In the Block Intrusions section, enable the toggle for intrusions you want to block.
IP Explicit Path
Rejects IP packets that contain an explicit source route field. These packets are not routed based on their target IP address. Routing information is defined beforehand.
Stops denial-of-service attacks that use TCP/IP stack loops. Detects packets with identical source and target addresses.
This attack type launches TCP connection attempts to force the targeted computer to commit resources for each connection. The protection establishes a maximum number of open TCP connections per second to prevent saturation of the computer under attack.
TCP Port Scan
Detects if a host tries to connect to multiple ports on the protected computer in a specific time period. The protection filters both the requests to open ports and the replies to the malicious computer. The attacking computer is unable to obtain information about the status of the ports.
TCP Flags Check
Detects TCP packets with invalid flag combinations. It acts as a complement to the protection against port scanning. It blocks attacks such as “SYN&FIN” and “NULL FLAGS”. It also complements the protection against OS fingerprinting attacks as many of those attacks are based on replies to invalid TCP packets.
IP: Rejects inbound packets with an IP header length that exceeds a specific limit.
TCP: Rejects inbound packets with a TCP header length that exceeds a specific limit.
Fragmentation Overlap: Checks the status of the packet fragments to be reassembled at the destination, which protects the system against memory overflow attacks due to missing fragments, ICMP redirects masked as UDP, and computer scanning.
Rejects UDP streams to a specific port if the number of UDP packets exceeds a preconfigured threshold in a particular period.
UDP Port Scan
Protects the system against UDP port scanning attacks.
Rejects WINS replies that do not correspond to requests sent by the computer. Smart DNS Rejects DNS replies that do not correspond to requests sent by the computer.
Rejects DHCP replies that do not correspond to requests sent by the computer.
Small PMTU: Detects invalid MTU values used to generate a denial-of-service attack or slow down outbound traffic.
SMURF: Attacks involve sending large amounts of ICMP (echo request) traffic to the network broadcast address with a source address spoofed to the victim's address. Most computers on the network will reply to the victim, which multiplies traffic flows. WatchGuard Endpoint Security rejects unsolicited ICMP replies if they exceed a certain threshold in a specific time period.
Drop Unsolicited ICMP Replies: Rejects all unsolicited and expired ICMP replies.
ICMP Filter Echo Request
Rejects ICMP echo request packets.
Rejects ARP replies that do not correspond to requests sent by the protected computer to avoid ARP cache poisoning scenarios.
Falsifies data in replies to the sender to trick operating system detectors. It prevents attacks on vulnerabilities associated with the operating system. This protection complements the TCP Flag Checker.