0
(0)

This article will help you to authorize a blocked application on your G DATA Firewall.

The G DATA Firewall is only included in the following products on PC:

Internet Security

Total Protection

The following tutorial will show you how to authorize an application on the G DATA Firewall.

In this example we are going to authorize Google Chrome, however the steps can be applied to any other application on your PC which you wish to manually authorize.

A. Authorize a blocked application with the Application Radar.

The Application Radar allows you to easily authorize a blocked application if your Firewall is set to autopilot mode.

Proceed as follows:

Step 1. Open your G DATA  software.

Step 2. Click on the Firewall icon in the navigation menu on the top side of the window.

Step 3. Check if the Mode is set to Automatic (autopilot) or not.
If it is not set to Automatic (autopilot) skip to section B of the tutorial.

Step 4. Click on Application radar, then Open application radar…

Step 5. If you see the blocked application in the displayed list then click on it. Now click Allow.

Step 6. Your blocked application has now been authorized on the Firewall.

B. If the Firewall is not set to Automatic (autopilot) or if a blocked application doesn’t appear on the Application Radar.

The most comprehensive way of managing the rules of your Firewall is via the Rule Wizard.

Proceed as follows to allow an application via the Rule Wizard:

Step 1. Open your G DATA  software.

Step 2. Click on the Firewall icon in the navigation menu on the top side of the window.

Step 3. Click on the second smaller icon in form of a snow flake on the top side of the window to open the panel Networks.

Step 4. Click on the network connection you are currently connected to.

If you don’t know which one it is, a cabled connection will often display “Ethernet” in its name, while a wireless connection will show “Wifi”.

Once you have selected your current network connection, click on Edit… on the bottom right hand.

Step 5. Now click Edit rule set…

Step 6. Click the first item Allow  or block applications.

Step 7. Click on the 3 dots on the right side, this will open a selection menu.

Step 8. Select the path to the application you wish to authorize on your PC.

For Google Chrome, the path is in general: “C:\Program Files (x86)\Google\Chrome\Application”.

Now click on the executable (.exe file) of your application and then Open.

For Google Chrome, the executable is named “chrome”.

Step 9. Make sure that Direction is set to Incoming and Outgoing and that Network access is set to Allow.

Step 10. Click OK to close the window.

Step 11.
 Click Apply at the bottom of the Rule Wizard window.

Step 12. Click OK again.

Step 13. Your application has now been authorized on the Firewall.

C. For Advanced users: How to authorize an application via the Firewall logs.

In some cases it can be useful to authorize an application via the logs of the Firewall, especially if you don’t know the exact name or path of the component of your application which tries to connect to the Internet. It could also be possible that several different components will have to be authorized for your application to work properly.

Proceed as follows:

Step 1. Open your G DATA program.

Step 2. Click on the Firewall icon in the navigation menu on the top side of the window.

Step 3. Open the logs of the Firewall by clicking on the small blue icon in form of a clipboard on the top right hand of the window.

Step 4. For a better visibility, you can delete the previous logs by clicking Delete all… at the bottom.

Step 5. Now open the application which you wish to authorize.

Step 6. The firewall logs will show a set of new entries related to your application.

Each entry is an attempt from a component of your application to connect to the Internet.

The name of the component is displayed under the column Application.

If any of these attempted connections were blocked, you will see a small red icon in form of a stop panel at the left of the entry.

Step 7. To allow any displayed component, click on any line showing that component. (In this example, we are going to click on chrome.exe)

Step 8. Right click on the line then click New rule…

Step 9. Change the Access from Deny to Allow, then click OK to confirm.

Step 10. Your application has now been allowed on the firewall.

Source : Official G Data Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 28 times, 1 visits today)