McAfee firewall 4.0 User Manual

Page of 56
Product Guide
35
4
McAfee Firewall Configurations
Overview
The configuration of McAfee Firewall is divided into two classifications – 
application (program) and system. Upon installation, a base set of rules for 
system services such as ICMP, DHCP and ARP are installed (these are 
considered default settings).
On the other hand, the programs classification is personalized. Whenever you 
run a new program that attempts to communicate over the Internet, McAfee 
Firewall will prompt and ask you whether you want to trust the program or 
not.
For example, using Internet Explorer, enter an Internet address or URL (i.e: 
http://www.mcafee-at-home.com) in the address bar of your browser and 
press ENTER. Internet Explorer will attempt to connect to that URL over the 
Internet. The first time you do this, McAfee Firewall prompts if you “trust” 
Internet Explorer. If you say “Yes,” McAfee Firewall notes Internet Explorer is 
allowed and whenever you use Internet Explorer in the future, McAfee 
Firewall will allow its traffic.
As you allow programs to use the Internet, McAfee Firewall “learns” the rules 
you are creating for the program and saves them for future use. If a Trojan 
horse program attempts to communicate out from your computer, McAfee 
Firewall will also prompt you whether you trust them or not, and the decision 
to block the Trojan horse program from communicating is easy and 
instantaneous.