Avast Antivirus: Setting up firewall application rules
How to configure the firewall application rules in Avast Antivirus
Firewall included in Avast Internet Security and Avast Premier creates rules each time an application or process starts for the first time. These rules determine how Firewall behaves toward each application or process when it connects to the internet or to another network. Although advanced users can manage these rules or create new ones, we recommend you only modify your Application Rules if absolutely necessary. For most use cases, Firewall formulates optimal rules without your input.
Create a new application rule
Default rules are created automatically for software applications from known and trusted sources the first time you start the application when Avast Premier or Avast Internet Security installed. Application Rules are organized into groups. Predefined groups correspond with application vendors. To add an application to an existing group, follow these steps:
- Open the Avast Antivirus user interface and go to Protection → Firewall.
- Click Application settings at the bottom of the screen.
- Click New application rule and select a group (vendor).
- Locate and select the executable file of the application you want to add.
- Click the group name, then use the orange bars to indicate the level of access you want to allow.
You can also create new groups. To do so, click New Group and provide a name for the group.
Adjust access restrictions
You can set connection allowances for each application or process to determine how strictly Firewall monitors any incoming or outgoing communication.
Click a group (or vendor name), then use the orange bars in the Allowed connections column next to an application rule name to set the authorization level:
- One bar (Friends out): outgoing connections with Friends networks only.
- Two bars (Friends in/out): incoming and outgoing connections with Friends networks only.
- Three bars (Internet out): all outgoing connections to the internet.
- Four bars (Friends in and Internet out): incoming connections with Friends networks only, and all outgoing connections to the internet.
- Five bars (All connections): all incoming and outgoing connections to the internet.
To Block all connections for an application, hover your cursor in front of the orange bars and click the red block symbol that appears.
Check your Friends networks at Firewall → Settings → Friends.
Set actions for unauthorized connections
In addition to defining the types of connections you authorize for applications or processes, you can also specify how Firewall behaves when it detects a non-authorized connection. For example, how Firewall manages an incoming connection from the internet for an application with its Allowed connections set to Internet out.
Click a group (or vendor name), then click the arrow next to the name of an application or process in the Application column to manage this setting. The following behaviors are available:
- Default rule: Firewall decides to allow or block connections based on the settings of the active Firewall Network profile (Private or Public).
- Auto-decide: Firewall allows connections with verified applications, but blocks connections from unknown or suspicious applications.
- Block: Firewall blocks all other connections.
- Ask: Firewall asks you to decide if you want to allow or block a connection each time a new request is received. Selecting this option may result in frequent and potentially annoying alerts.
Set actions for unauthorized connections
Further, tighten rule restrictions by specifying the network ports each application uses for communication when an incoming or ongoing connection is allowed. Follow these steps:
- Click a group (or vendor name) to open the list of applications or processes in that group.
- Click the arrow next to the name of an application or process in the Application column to expand its individual communication settings.
- Specify the ports you authorize the application or process to communicate with (for incoming or outgoing communication depending on the defined access restrictions):
- Type specific port numbers into the text box. For multiple ports, separate each port number with a comma.
- Select All from the drop-down menu to authorize communication with all ports.
- Select a predefined port number from the drop-down menu.
- Optionally, click Packet rules to manage these settings according to a connection type.
Packet rules enable you to view and manage Firewall rules that control whether network traffic is allowed or blocked according to the information contained in network packets. This information may include network protocols, source or destination IP addresses, and local and remote ports. Firewall uses packet rules to control network traffic using specified connection parameters, while Application Rules only control traffic according to individual rules for programs or services.
Different application or process types require different ports. For example, for internet browsers, port 443 is the default port used for HTTPS (secure HTTP), and port 80 is the most commonly used port for HTTP (unsecured), therefore the port numbers entry for application rules is 443,80. For information about the correct network port to specify for an application, contact the application vendor or refer to the application's documentation or support pages.
- Avast Premier 17.x
- Avast Internet Security 17.x
- Microsoft Windows 10 Home / Pro / Enterprise / Education
- Microsoft Windows 8.1 / Pro / Enterprise
- Microsoft Windows 8 / Pro / Enterprise
- Microsoft Windows 7 Home Basic / Home Premium / Professional / Enterprise / Ultimate
- Microsoft Windows Vista Home Basic / Home Premium / Business / Enterprise / Ultimate
- Microsoft Windows XP Home / Professional / Media Center Edition