LANDesk Firewall

The new LANDesk Firewall tool is an important component of Endpoint Security that lets you protect managed devices from unauthorized application operations and connections.

With LANDesk Firewall settings, you can create and configure trusted programs (applications), trusted network scopes, and connection rules to protect managed devices from unauthorized intrusions.

NOTE: LANDesk Firewall and Windows Firewall
The LANDesk Firewall complements the Windows Firewall, and both can be enabled and running at the same time on managed devices.

Component of Endpoint Security

LANDesk Firewall is one of the components of the comprehensive Endpoint Security solution, along with the Host Intrusion Prevention (HIPS) and Device Control tools.

Read this section to learn about:

Using LANDesk Firewall settings

Firewall settings give you complete control over how the LANDesk Firewall operates on target devices.

This section describes how to create and manage Firewall settings.

Creating LANDesk Firewall settings

To create LANDesk Firewall settings
  1. In the Security Configurations tool window, right-click LANDesk Firewall, and then click New.



  2. At the General settings page, enter a name for the settings, enable the LANDesk Firewall service, and then specify the protection mode. For information about an option, click Help.
  3. At the Trusted programs page, add and edit applications you want to be able to connect to and from the network and the Internet. You can also define the trusted scope.
  4. At the Connection rules page, define the connection rules (incoming or outgoing, and action) by port, protocol, or IP range.
  5. Click Save.

Once configured, you can deploy settings to target devices with an installation or update task, or a change settings task.

LANDesk Firewall settings help

Use this dialog to create and edit LANDesk Firewall settings. When creating Firewall settings, you first define the general protection mode, and then add and configure specific trusted programs, trusted scopes, and connection rules. You can create as many settings as you like and edit them at any time.

If you want to modify the device default settings without reinstalling the Endpoint Security agent or redeploying a full agent configuration, make your desired change to any of the options on the settings dialog, assign the new settings to a change settings task, and then deploy the change settings task to target devices.

This dialog contains the following pages.

About the General settings page

Use this page to enable the LANDesk Firewall and configure the protection mode.

This page contains the following options:

About the Trusted programs page

Use this page to create and manage trusted programs and trusted scopes.

This page contains the following options:

About the Configure trusted application dialog box

Use this page to configure connection rules for a specific application.

This page contains the following options:

About the Trusted scope dialog box

Use this page to configure and manage trusted scopes. A trusted scope is made up of a collection of network addresses, by IP address, IP range, or subnet.

This page contains the following options:

About the Connection rules dialog box

Use this page to view, manage, and prioritize connection rules. Connection rules can allow or prevent connections based on port or IP range, whether the program is trusted, and whether the communication is within the trusted network scope.

This page contains the following options:

About the Configure connection rule dialog box

Use this page to configure connection rules.

This page contains the following options: