Home

CoGen Personal Firewall Online Manual

image

Contents

1. Method 2 Boot the computer and start Windows 98 Me NT 2000 XP 2003 Open the Control Panel and double click Add Remove Programs Select CoGen Personal Firewall in Change Remove Programs then click the Change Remove button to uninstall After uninstall is complete click Finish If Delete installation directory is checked the firewall installation directory will be deleted Fi nt 6 CoGen Personal Firewall Your Security Our Concern 2007 CoGen Media All rights reserved Start Firewall There are three ways to start CoGen Personal Firewall Method 1 Inthe Windows Start menu select Programs gt CoGen Personal Firewall gt CoGen Personal Firewall CoGen Tools i Add or Remove Components k CoGen Main Application CoGen Personal Firewall fg CoGen Personal Firewall J SmartUpdate Method 2 ri CoGen Personal Firewall e Double click the shortcut icon on the desktop to start CoGen Personal Firewall Method 3 e Click the icon lin the Quick Launch area of the taskbar You can set CoGen Personal Firewall to launch automatically at startup refer to Standard Settings You can double click the icon in the system tray or right click the icon and select Open Main Menu to display the main window Your Security Our Concern 2007 CoGen Media All rights reserved Main Window E Colen Personal Firewall Actions Settings Help Firewall Statu
2. Actions Act i ons Disable Firewall Disconnec a Switch Mode Shopping Mode j View Log Silent Mode Te Scan Memory for Trojans Standard Mode Smart Update wf E Disable Firewall e Disables all firewall protection This option is the same as the Disable button in the main window e When the firewall has been disabled this option will be changed into Enable Firewall Click it to restart firewall protection gt Disconnect e This function disconnects your computer from the network just as if the cable is pulled out or the modem is turned off If someone is continuously attacking your computer via different methods this will be the most direct and effective deterrent This option is the same as the Disconnect button in the main window After the network is disconnected this option will change to Connect Click it to resume network connection gt Switch Mode e CoGen Personal Firewall has three default modes Shopping Mode Silent Mode and Standard Mode The mode will determine whether the firewall will allow or deny a program network access Specific settings for individual programs can be set in Application Rules Detailed settings can be configured for each mode in the Settings window Refer to Standard Settings and Applications Default applications for three modes are as follows o Shopping Mode Deny network access for any programs not listed in Application Rules o Silent Mode Deny network access f
3. Trusted can only be applied by clicking the button Edit can only be used through the right click menu Other functions can be used by either method Application Rules You can adjust filter rules for programs which access the network in the local computer Display e Your computer s applications and their status are given in the list e Checked items take effect Related Operation Add 1 Click Add button or right click the item and select Add in the popup menu to open Add Application Rule window Add Application Rule E E Application Rule Basic Application Browse Advanced Path oi Version LS Regular application lt Standard Mode Send Email MB Check if this fle has been modified 2 Click Browse to locate the application program The interface automatically shows the name computer and version information 3 Select type application in standard mode whether email transmission is allowed 4 Check if files in Application Rules have been modified If you check this item the firewall will check if it is modified when the application program accesses the network 5 Click Next button or click Advanced on the left to enter Advanced Settings interface you can then set application rules under various modes Add Application Rule E E Application Rule Basic Locked Allow Logged Out Le Advanced Screen Saver Silent Mode ma PassWatcher Shopping Mode Run as server oO
4. Export 1 Click Export and input the file name in the popup menu then click Save 2 If the file you select already exits you will be asked whether to overwrite during export Move 1 Select and highlight the rule to be moved 2 Right click it then choose Move Up Move Down in the popup menu then the rule can be moved up down Lf After the item is selected you can also move the file by pressing Ctrl key Up Down key Protocol Settings gt Protocol Type e Protocols can be categorized into 11 types such as ALL TCP UDP TCP OR UDP ICMP IGMP ESP AH GRE RDP SKIP Different protocol types will affect the following options Port e This function sets remote and local ports The user may select Any Port Specific Port Port Range or Specific Port ICMP LF It will only be displayed when the protocol type is ICMP e Specific type Specify a single filter type e Select types Specify multiple types for combination and control direction Click Select to enter detailed settings and select the types to be controlled Then check Inbound Outbound and click the Apply button to take effect Any type Effective to all ICMP types gt Characteristics Check Check characteristics click the Edit button to open the Define Data Packet Characteristics window Input the offset Press Insert key in Content box Insert a byte when you press the key each time e The characteristics string can
5. Allow Allow All Dery All Previous e gt f Finish af Close 6 Set whether itcan Run as server 7 Click Finish to save and exit Edit 1 Select and highlight the rule to be edited Right click the rule and select Edit in the popup menu to open Edit window 2 Edit the item where basic items are as same as in Add Click Save to finish or click Exit to give up the edit Lf You can also double click the item to open Edit window Delete 1 Select and highlight the rule to be deleted then click Delete button or right click the item and select Delete in the popup menu 2 Confirm to delete Lf You can also select the item then press Delete key to delete the rule Lf When rules are selected you can select multiple items by pressing Ctrl key and Shift key Import 1 Click Import button and select rule files fwr in the popup menu then click Open 2 If there are rules already in the list you will be asked whether to delete the existing rules during import You can choose Yes No or Cancel Export 1 Click Export and input the file name in the popup menu then click Save 2 If the file you select already exits you will be asked whether to overwrite during export Blacklist Specified computers on the list will be denied communication with your computer Display e The list displays Rule IP Address Created by and Duration e Checked items take effect gt Related Operation Add 1 Click Ad
6. User ID into the reminded window then select Register complete installation Notice if you do not have the License Key please click Buy Now to obtain Your Security Our Concern 2007 CoGen Media All rights reserved CoGen Personal Firewall ec CoGen Personal Firewall A Your license will expire Click Buy now to obtain a new license Notice If you already have a Product Key and User ID enter below to register your product Product Key B UserID Register To obtain a Product Key click Buy Now For more information click Online Help Product Status Close There are 30 day s left to use this software Buy now Online help Lf It is strongly recommended that other personal firewalls be uninstalled before this software is installed Uninstall CoGen Personal Firewall You can easily uninstall all files program groups shortcuts and the registry of CoGen Personal Firewall Method 1 Boot the computer and start Windows 98 Me NT 2000 XP 2003 In the Windows Start menu select Programs gt CoGen Personal Firewall gt Add or Remove Components select Uninstall and click Next Te CoGen Personal Firewall CoGen Personal Firewall Maintenance Choose one of the following Add or Remove Features Repair Reinstall p ia Restore Coen Personal Firewall to its original state ji ca Delete CoGen Personal Firewall from this computer
7. in the left menu or click Next then configure the protocol For more information refer to Protocol Settings 5 Click Alert Mode in the left menu or click Next then select the alert mode after a match is found Balloon notice Notify the user by balloon notice e Popup menu Notify the user by popup menu Record in log whether to record it in the log 1 Select one item with existing rules 2 Click Insert button to show Add IP Rule window 3 Other actions are as same as those in Add 4 Inserted rules are listed before the selected rule in the first step 1 Select and highlight the rule to be edited Right click the rule and select Edit in the popup menu to open Edit window 2 Edit the item where basic items are as same as in Add Click Save to finish or click Exit to give up the edit L You can also double click the item to open Edit window Delete 1 Select and highlight the rule to be deleted then click Delete button or right click the item and select Delete in the popup menu 2 Confirm to delete Lf You can also select the item then press Delete key to delete the rule LF When rules are selected you can select multiple items by pressing Ctrl key and Shift key Import 1 Click Import button and select rule files fwr in the popup menu then click Open 2 If there are rules already in the list you will be asked whether to delete the existing rules during import You can choose Yes No or Cancel
8. network just like unplugging the network cable or switching off the modem Other people cannot access your computer but you cannot access the network either After disconnecting this icon will change to Connect Click it to restore network connection You can also select Actions gt Disconnect e Starts SmartUpdate to update the program You can also select Actions gt SmartUpdate For more information refer to Update e Opens the log files For more information refer to View Log You can also select Actions gt View Log WE Log Tabs Tabs are located at the top of main window The selected tab will be highlighted Firewall Status Activity Startup PassW atcher There are six tabs e Firewall Status e Activity e Startup e PassWatcher Set Security Level gt Steps 1 Open the CoGen Personal Firewall main window refer to Start Firewall 2 Drag the sliding block at the bottom right of the window to the preferred security level Security Level Lf Definitions and rules for the security levels e Low This setting is appropriate when your computer is connected to a local network without Internet access All network access is allowed unless otherwise specified in Rules e Medium This setting is appropriate when your computer is connected to a local network with Internet access Sharing is allowed by default but some risky ports will be denied access e High This setting is appropriate when your compu
9. nt be aa aa E O rents and more enjoyable Internet and computer experience for you the end user By installing and using this software the Software you hereby agreed to the folowing terms and conditions 1 LICENSE Subject to the terms and conditions of this Agreement CoGen Media gants to you a limited non exdusive non transferable license to use or evaluate 4 Ol Agee Ol Disagree Step 5 Click Finish to install all components in the default mode For custom installation you can select the components you wish to install and click Next Your Security Our Concern 2007 CoGen Media All rights reserved CoGen Personal Firewall Choose Destination Setup will install CoGen Personal Firewall in the following folder Step 7 In Select Program Folder choose the program folder and click Next to continue Your Security Our Concern 2007 CoGen Media All rights reserved all i b CoGen Personal Firewall Setup wil add program icons to the Program Folder listed below You may type a new folder name or select one from the Existing Folders list Click Next to continue Program Folder CoGen Personal Firewall Existing Fokders Accessones Step 8 In Installation Information confirm the information and click Next to continue el z x b CoGen Personal Firewall Installation Information Ready to continue ie Please confirm whether the following information is correct Click Previo
10. proxy server Server IP Address Fort Proxy requires Authentication User rame Password 3 f Access Internet via proxy server is selected the server s IP address port and ID authentication if necessary must be entered 4 Click OK to save changes Lf Please ensure your network settings are correct so that SmartUpdate can download program updates Lf The Access Internet via dial up network option only appear if you have dial up Internet access User ID The User ID verifies that you are using a valid copy of CoGen Personal Firewall A valid User ID is needed for program updates gt Steps 1 Open CoGen Personal Firewall main window 2 Select Settings gt User ID to open the User ID window User ID The User ID vertes whether this i alid copy of Coben Personal Firewall Only those with valid User Ds have to updates User ID 3 Input your User ID this may already have been entered 4 Click OK to confirm SmartUpdate SmartUpdate checks for and downloads any updates to CoGen Personal Firewall There are three ways to begin SmartUpdate e Method 1 Click the Update button on the right side of the main window e Method 2 In the main window click Actions gt SmartUpdate e Method 3 Right click the firewall icon in the system tray and select SmartUpdate Now in the pop up menu Lf Before you begin SmartUpdate please make sure your computer is connected to the Internet and Connection is configured
11. support 27 types at the most In the content box hexadecimal numbers are shown on the left and ASCII are displayed on the right When you click OK to exit it will automatically calculate the length according to the string you ve input gt TCP Flags Lf These are only shown when the protocol type is TCP or TCP OR UDP Select Check TCP flags and click the Edit button to open the Check the Following TCP Flags window e Check the items you wish to set into allow and click OK to take effect e TCP flags include o URG Effective for urgent packet s This is used to prevent TCP data stream disruption o ACK Acknowledge serial number is effective This prompts the remote system when it has successfully received all data PSH Submission to the application layer as soon as possible This means requested data segment can be directly sent to the application program after the segment is obtained by the recipient It is unnecessary to send until the buffer is full RST Reset connection This is used to reset any wrong connection and or to refuse illegal data and request s SYN Synchronize the connection This is effective only when TCP connection is set and will prompt the TCP connection client to check the serial number FIN Finish transmission Data packet with this flag bit is used to finish a TCP dialog but the corresponding port still remains open ready to receive any subsequent data
12. version shortcut directory and files PassWatcher will be enabled for all checked items You can add rules to the list by clicking the PassWatcher tab in the main window NOTE When you first add a program to PassWatcher you may not be able to enter passwords while using the program In this case you need to add the relevant modules for the program to the Trusted Modules list You should determine which modules need to access the program and add them to the list see below Operation gt Add Click the Add button to show the Edit PassWatcher rules window Input the program name and version and click Browse to find the program s shortcut Directory and Files will be filled in automatically Jour ability to the Program Name ST program files internet explorer iexplore exe Deactone C Program Files Internet Explorer Fi IEXPLORE EXE If a new file is to be added click Add to add the file You can press Ctrl to select multiple files at one time gt Edit Right click and highlight the rule then select Edit to edit the rule Lf You can also double click the rule to edit gt Delete e Select and highlight the rule to delete then click Delete and confirm E You can also select the rule and press Delete key to delete it Import Click the Import button and choose the rules file fwr in the Choose file window then click Open If the rule already exists in the list you will be asked
13. CoGen Personal Firewall Online Manual e Install and Uninstall Quick Start e Functions Detailed Settings Update Install amp Uninstall e System Requirements amp Languages Install CoGen Personal Firewall e Uninstall CoGen Personal Firewall Quick Start e Start Firewall e Main Window e Menus Buttons e Tabs Functions Start Firewall e Set Security Level e Switch Mode Select Language Select Skin e View Log e Trojan Scan e PassWatcher Enable Disable Firewall e Connect Disconnect Exit Detailed Settings From the CoGen Personal Firewall main window select Settings gt Detailed Settings e Standard settings e Advanced settings e Rules settings Update Connection User ID e SmartUpdate System Requirements amp Languages Operating System e Windows Windows 98 Me NT 2000 XP 2003 Hardware e CPU Pentium III 500 MHz or higher RAM 64 MB or above e Display Standard VGA 24 bit true color Other CD ROM drive mouse Languages CoGen Personal Firewall is currently available only in English language More languages will be supported in the near future Install CoGen Personal Firewall Step 1 Boot your computer and start Windows 98 Me NT 2000 XP 2003 Close all other applications Step 2 Insert the CoGen CD into the CD ROM drive If the opening screen does not appear double click Autorun exe in the root directory of the CD If you downloaded the CoGen Perso
14. EN UDP data transmission gt Operation Right click the item to show a pop up window for further actions as follows Trojan Scan This performs a Trojan scan upon the selected processes e Go to Directory Opens the directory where the process program is located e Properties View properties of the item Processes gt Display This displays information on processes and organizes all processes into a tree structure with hierarchy Each process shows map name process ID full path and command line Note that you may need to move the scroll bar to see the last item The process icon if any will be displayed before the map name gt Operation Right click the process to choose further actions as follows e Suspend process This will suspend the process the process is displayed in gray and becomes invalid Then it changes into Resume process and you can click it to resume the process End process This forces the process to end e Trojan Scan This performs a Trojan scan upon selected processes e Go to directory Opens the directory where the process program is located e Properties View properties of the item e View Modules View the module list loaded by the process including module name company and path Highlight Microsoft Signed Items This will highlight Microsoft signed items to be differentiated from other processes Highlight CoGen Signed Items This will highlight CoGen signed items to be different
15. button or right click the rule and select Delete in the pop up window 2 Select OK to delete Lf You can also press Delete key to delete the selected rule Choose settings for the selected Trusted Zone 1 Select a relevant rule then check Allow inbound outbound ping Allow inbound connection from remote high risk ports when Security Level is set at Medium Allow outbound connection from remote high risk ports when Security Level is set at Medium IP Rules IP Rules can be customized to provide security for your system The more rules there are the lower overall system performance will be There is no need to add rules related to applications since the firewall will open the port when the application needs it Also you should not add preventive rules since such rules are built inside the system and will be updated automatically gt Display e The list displays the IP rules currently used including rule name status protocol remote port local port and alert Rules are sorted based on filter sequence e Checked items take effect gt Related Operation Add 1 Click Add button or right click the item and select Add in the popup menu to open Add IP Rule window 2 Add rule name and select the action after a match is found 3 Click Address in the left menu or click Next then input the local address and remote address If the local address is specified click Browse to select a local address 4 Click Protocol
16. ces sound alert when it is under attack You can click Browse to select the sound file wav for alert Show status balloon e Configure whether the balloon is displayed for firewall status It is selected in default Create Logs Define which types of events will be recorded in logs including Scan memory for Trojans Activity Options Application denial Rule edits Click Settings for more detailed settings Log size Set log size Default size is 5M Show __ items per pages Set the number of items shown per pages Default number is 500 Backup when maximum size reached It is checked in default e Backup limit Set the maximum size of backup files Default size is 100M Backup to The destination to save backup files Click Browse to change the path Choose whether to allow applications to connect to the network in the following modes Three default actions o Deny Request for network access by applications will be denied without prompting the user o Allow Request for network access by applications will be allowed automatically without prompting the user o Ask me Prompt the user to select whether it is allowed Six modes o The firewall executes different rules based on different modes and different computer statuses gt Screen Saver The option of request for network access by applications under screen saver Deny is in default o Locked The option of request for network access by applications under l
17. d button or right click the item to select Add in the pop up menu then Add Blacklist Rule prompt opens 2 Input name IP type Specific or Address range Enter IP then click Save Lf Duration can be skipped which is automatically completed when the attacker s information is added into the blacklist Edit 1 Select and highlight the rule to edit then select Edit to open Edit Blacklist Rule prompt 2 Edit the items then click Save to complete this edit or click Cancel to give up this edit L You can also double click the item to open Edit Blacklist Rule prompt Delete 1 Select and highlight the rule to delete then select Delete button or right click the item and select Delete in the pop up window 2 Select OK to delete Lf You can also press Delete key to delete the selected rule LF With Ctrl and Shift keys multiple rules can be selected Whitelist Whitelist Rules specify IP addresses that are always permitted communication with and have full access to the local computer For example a VPN server can be added to this list Use caution when editing this list Display e The list displays Rule and IP Address e Checked items take effect gt Operation Add 1 Click Add button or right click the item to select Add in the pop up menu then Add Whitelist Rule prompt opens 2 Input name IP Address Specific or Address range Enter IP then click Save Edit 1 Select and highlight the rule to edit
18. er to Advanced Settings gt Data Flow Curve The graph near the bottom of the window is the Data Flow Curve and contains two lines The above curve is for Received bytes and the bottom one is for Sent bytes To the left of the graph you can manually adjust the highest peak for the data packet curves set at 10K by default and unnecessary to change under normal circumstances To the right of the graph the number of received and sent bytes is displayed Activity The Activity tab allows you to check network activities as well as processes network access module information etc You can switch between Network and Processes The default page shows Network activities Network gt Display All TCP UDP connection information is displayed here including all TCP UDP monitors e Connections are listed according to processes and sorted by program name e For each application program program name PID and program path are listed Program command TCP UDP monitor and connection information address port port information are shown below Show stall de i avmond exe i a 4 Local 0 0 0 0 6059 Take Ravmond exe for example you can see that the application program is Ravmond exe PID is 1220 the path is C Program Files CoGen Rav Ravmond exe command line is C Program Files CoGen Rav Ravmond exe The program monitors TCP 6059 port of all local addresses e Icon x TCP monitor port Set up TCP connection I
19. he firewall tray icon 2 Select Detailed Settings in the pop up menu 3 Select Options gt Advanced in the left column gt Settings Advanced Settings Enable firewall before login The system is under firewall protection without login It is checked in default e Scan memory for Trojans before entering PassWatcher Trojan scan is automatically performed when starting the game It is checked in default e Scan memory for Trojans at startup Trojan scan is automatically performed when the firewall starts up It is not checked in default e Check if files in Application Rules have been modified It can check if the file is modified If any setting is to be made upon the file under protection you need to make settings in Applications For more information refer to Applications It is unchecked in default Password Protection You can select Password required to modify settings and Password required to exit program This option can prevent unauthorized people from modifying firewall settings or close the firewall It is unchecked in default LF When Password Protection is enabled a Enter password window will pop up for you to input the password Prompt Display Time e When applications attempt network Enter the prompt display time when applications attempt network The default time is 60 seconds e When IP data packets arrive Enter the prompt display time when IP data packets arrive The default time is 30 seconds e Popup ba
20. iated from other processes L Some processes such as Explorer exe cannot be suspended or ended Related options will be disabled LT Suspicious processes in the system will be marked in red Be careful when dealing with these processes Stop Refreshing e By default the system automatically refreshes network activities and processes Click this button to stop Refresh e When Refresh is turned off this button will change to Refresh On Click it to resume Refresh Lf You can also right click the firewall tray icon then select System Status in the pop up menu to enter this tab Startup The Startup tab allows you to manage applications and registry keys that will launch at startup These include programs in the Windows Startup folder Run or RunOnce keys in the system registry and other system keys Be careful when enabling or disabling items in this tab gt Display e You will see a list of all items that run automatically upon system startup including the item description company and path You may need to scroll the bar to see all pages depending on the screen size e Items are grouped by category Click the item for more detailed information or double click the item to locate it on your computer gt Operation Display Settings Right click anywhere in the list to choose what items to display Checked items are selected Contents in the settings include o Show AutoRun Show Services Show Drivers Show Explorer Plugi
21. lloon notices Enter the prompt display time when popup balloon notices The default time is 10 seconds Vulnerability Check Set Remind me to run next Vulnerability in days The default time is 5 days e If you don t perform the vulnerability check beyond the specified prompt time it will display the prompt to remind you at Risks in Firewall Status page gt Other Functions Reset Revert to default settings e Save Save current settings Rules You can create rules to customize CoGen Personal Firewall e Blacklist Specified IP addresses will always be denied communication with your computer e Whitelist Specified IP addresses will always be permitted to communicate with your computer e Ports Allow or deny communication with specific ports turn on off ports between local and remote ports e Trusted Zone You can differentiate your local network from the Internet via Trusted Zone settings e IP Set up IP layer filter rules e Application Choose whether to allow or deny specified programs to access the network Connection gt Steps 1 Open CoGen Personal Firewall 2 In the main window select Settings gt Connection to open the Connection window Choose how SmartUpdate will access the Internet Use Internet Explorer connection settings is the default setting Connection Use Internet Explorer connection settings Access Internet via LAN or direct connection Access Internet via proxy server Use the following
22. mpletely close the personal firewall and your computer will lose firewall protection Standard Settings Detailed Settings ettings o Advanced TR Sutomaticalls S EEE pplications fig 7 Rules Be Blacklist Sound alert F2 Show us balloon Whitelist Create Logs EN Options Trusted Zone i r i 3 Rule edits Activity m o ptions Application denial ow applications to connect to the network in the gt only apply when not specified in Application Rules aver A Logged Out Locked Silent Mode Shopping Mode _ Operation Method Method 1 1 Open firewall main menu 2 Select Settings gt Detailed Settings Method 2 1 Right click the firewall tray icon 2 Select Detailed Settings in the pop up menu Settings Launch firewall Automatically Firewall will start automatically upon system startup This is a default setting Manually Firewall doesn t start upon system startup Rule priority You can select Applications or IP for rule priority When there s any conflict between Applications and IP the firewall will proceed with the selected option For example Applications allowsJE pragram to access the network wbile IP prohibits the access to CoGen website Ifyou select the rule priority as Applications then it can access CoGen website If you select IP you cannot access CoGen website even if Applications allows IE to access the website Sound alert e Set whether the computer produ
23. nal Firewall installation program from the Internet double click the installation package to begin Select Install CoGen Personal Firewall If you download installation file from CoGen website please run CoGen_FW exe If you download installation file from CoGen website please run CoGen_FW exe Step 3 Click Next to continue al e fo CoGen Personal Firewall Welcome to CoGen Personal Firewall Welcome to the CoGen Personal Firewall Installation Wizard This Wizard wil install CoGen Personal Firewall on your computer It is strongly recommended that you exit al Windows programs before running this instalation Wizard WARNING This program is protected by copyright law and international treaties Unauthorized reproduction or distribution of this program or any portion of it may result in severe civil and criminal penalties and will be prosecuted to the maximum extent possible under law Click Next to continue or Cancel to exit the Installation Wizard Coven aa s b CoGen Personal Firewall End User License Agreement Please read the following important information before installing Please read the following End User License Agreement Press the PageDown key to read the rest of the agreement SOFTWARE END USE LICENSE AGREEMENT PLEASE READ THIS AGREEMENT CAREFULLY BEFORE INSTALLING OR USING THIS SOFTWARE CoGen Media Canada Ltd CoGen Media strives to provide exceptional software
24. nd highlight the rule to be deleted then click Delete button or right click the item and select Delete in the popup menu 2 Confirm to delete L You can also select the item then press Delete key to delete the rule Lf When rules are selected you can select multiple items by pressing Ctrl key and Shift key Trusted Zone You can create Trusted Zones for local networks that do not pose a great risk to your computer You can set the list of Trusted Zones and adjust settings If you create a Trusted Zone with your local area network s IP address the settings will apply to all computers in that network By default remote computers are not in a Trusted Zone If your computer is directly connected to Internet use caution when setting up a Trusted Zone Display The list displays the Name Local IP and Remote IP for the Trusted Zones gt Operation Add 1 Click Add button or right click the item to select Add in the pop up menu then Trusted Zone Rule prompt opens 2 Input Name Local Remote IP then click OK Lf When Local IP is Specific address click Browse to select a local IP Edit 1 Select and highlight the rule to edit then select Edit to open Trusted Zone Rule prompt 2 Edit the items then click Save to complete this edit or click Cancel to give up this edit Lf You can also double click the item to open Trusted Zone Rule prompt Delete 1 Select and highlight the rule to delete then select Delete
25. ns Show Internet Explorer Plugins Show System Image Hijacks Show Appinit DLLs Show Winlogon Notifications Show Winsock Providers Show Known DLLs Show ShellExecute Show Empty Items Hide Signed Microsoft Items Hide Signed CoGen Items Delete Right click the item select Delete Selected Items in the menu and click it e Copy Right click the item select Copy in the menu which can copy the item information to the clipboard You can also use the shortcut Ctrl C to copy e Refresh Right click the item and select Refresh in the menu or directly press F5 to refresh Go to Right click the item and select Go to in the menu to find the corresponding location of the program probably the shortcut in the Windows Startup folder or the corresponding item in the registry where you can modify it manually e Properties Right click the item and select Properties in the menu to check properties e Disable Uncheck the item to disable it at system startup O O O0 O0 O0 OO O0 O0 O0 OO CD LT Some registry items cannot be disabled or deleted PassWatcher This function provides protection for passwords that are used in online games online banking and other situations CoGen Personal Firewall protects passwords by using process wall technology that effectively prevents passwords from being stolen and transmitted PassWatcher can be enabled for many different programs that use passwords The list displays the program name
26. ocked screen Deny is in default o Online Game The option of request for network access by applications after entering the game program specified by Game Protection Deny is in default Shopping Mode The option of request for network access by applications under shopping mode Deny is in default o Logged Out The option of request for network access by applications under logged out mode Deny is in default o Silent Mode The mode without interaction with the user and the option of request for network access by applications under silent mode Deny is in default O Lf Screen Saver Logged Out Locked and Online Game can be automatically switched according to the computer status Other three modes are in manual switch Refer to Switch Mode Other Functions Reset Revert to default settings Save Save current settings Advanced Settings Detaled Settings BH Options Standard Advanced E F Rules E Hadist Whitest i oe A us F o fa Scan meray for Trojans before entering Parsw atches arts Trusted Zone E Check filer in Appication Rules have bean modified IF M Psesword Protection E Aspications E Prompt Display Tima BECOME then IF dala packels ares Sah OP Popup balloon notices pacari Prec Opening Detailed Settings Method 1 1 Open firewall main menu 2 Select Settings gt Detailed Settings 3 Select Options gt Advanced in the left column Method 2 1 Right click t
27. ojans 3 scan window will appear in the bottom right corner of your screen prompt will appear when the scan has finished You can click Details to view the results Cc Scanning for trojans Scan completed Mo trojans found PassWatcher gt Steps 1 Open firewall main window 2 Select Settings gt PassWatcher L4 For more information refer to PassWatcher Enable Disable Firewall There are three ways to enable or disable firewall protection Method 1 1 Open the CoGen Personal Firewall main window 2 Click the Enable Disable button on the right side of the main window Method 2 1 Open the CoGen Personal Firewall main window 2 Inthe main window select Actions gt Enable Firewall Disable Firewall Method 3 1 Right click the CoGen Personal Firewall icon in the system tray then select Enable Disable Firewall L For more information refer to Menus Connect Disconnect gt Steps Method 1 1 Open CoGen Personal Firewall 2 Click the Connect Disconnect button on the right side of main window Method 2 1 Open CoGen Personal Firewall 2 In the main window select Actions gt Connect Disconnect Method 3 1 Right click the firewall tray icon then select Connect Disconnect in the pop up menu L For more information refer to Menus Exit CoGen Personal Firewall gt Steps 1 Right click the firewall tray icon then select Exit 2 Click OK Lf This operation will co
28. on in the main window Refer to Buttons Select Actions gt View Log in the main window e Right click the CoGen Personal Firewall icon in the system tray and click View Log in the pop up menu Lf Notes on Logs There are ten types of Logs e System Events This log records events such as system attack firewall enabled disabled disconnect IP Events This log records IP information on firewall records requested by rules e TCP Events This log records TCP information on firewall records requested by rules e UDP Events This log records UDP information on firewall records requested by rules e PassWatcher Events This log records information on PassWatcher events e IP Rules Events This log records IP rules edited by the user e Firewall Settings Events This log records firewall settings configured by the user e PassWatcher Edits This log records event information of firewall rules edited by the user e Trojan Scan Events This log records event information of Trojan scans in the memory Operation e Backup All This will automatically create a backup of all log data and clear the screen To load the old data click the Log History button and load the file e Clear All This will clear all logs without saving a backup e Log History Allows you to select previously saved logs dat and import then into the list for view Trojan Scan gt Steps 1 Open CoGen Personal Firewall main window 2 Select Actions gt Scan Memory for Tr
29. or any programs not listed in Application Rules without prompting the user o Standard Mode Ask the user whether to allow or deny access for any programs not listed in Application Rules e You can also right click on the firewall tray icon to switch modes gt View Log e Opens the log window This option is the same as the View Log button in the main window gt Scan Memory for Trojans e Starts performing Trojan scan After the scan finishes results will be displayed gt SmartUpdate e Begins SmartUpdate which will check for any program updates This function is the same as the Update button in the main window For more information on SmartUpdate refer to Update gt Exit Closes the main window Note that only the main window will close and firewall protection will still be active If you want to fully exit the program and disable all firewall protection right click the CoGen Personal Firewall in the system tray and choose Exit Settings ailed Settings Pass Watcher Connection User ID gt Detailed Settings Opens the Detailed Settings window gt PassWatcher e PassWatcher provides protection for passwords that are used in online games online banking and other situations CoGen Personal Firewall protects passwords by using process wall technology that effectively prevents passwords from being stolen and transmitted PassWatcher can be enabled for many different programs that use passwords For more info
30. rmation see PassWatcher gt Connection e This allows you to adjust the connection settings for SmartUpdate For more information refer to Connection gt User ID e Set the User ID to enable SmartUpdate For more information refer to User ID Help Topics CoGen Website About Cotsen gt Help Topics Takes you to the Help file where you can find answers to common questions gt CoGen Website e Choose this to connect to the CoGen homepage About CoGen e View CoGen Personal Firewall copyright and version information Firewall Status This is the tab that appears when you first open CoGen Personal Firewall gt System Status e This displays the mode in which CoGen Personal Firewall is currently operating along with the default action when applications not specified in Application Rules attempt network access Refer to Switch Mode gt Attack Status e This section displays information on any attempted attacks upon your computer Following an attack click Locate IP to determine the attacker s IP address Click Details to view the log recording the attack gt Active e This displays the icons of programs running on your computer If the program is busy its icon will be flashing gt Risks e This will display any vulnerabilities detected in your computer including Critical Updates that have not been installed and Potential Security Risks e You can ask to be reminded to run Vulnerability Check Ref
31. s Actreky Startup Oisconnect Update ura 10 sera bytes 5 138K Current Version 19 74 10 Updated 2007 03 13 View Log Poseres os RUN Securty Level Contents Menu Bar Shortcuts to menu actions including Actions Settings and Help For more information refer to Menus Buttons Buttons are located on the right side of main window including Enable Disable Connect Disconnect Update and View Log For more information refer to Buttons Tabs Tabs are located in the main interface and include Firewall Status Activity Startup PassWatcher and Vulnerability For more information refer to Tabs Security Level The Security Level setting is at the bottom right of the window Drag the sliding block to the preferred level For more information refer to Set Security Level Current Version and Updated Date Current version and date last updated are displayed near the bottom of the main window Menus Menus include Actions O Settings T Help H Buttons Buttons are located on the right side of the main window and include Enable Disable Connect Disconnect Update and View Log Function Disables firewall protection Selecting this will turn off firewall protection e If firewall protection is already stopped this button will switch into Enable Click it to enable firewall protection again You can also select Actions gt Disable Firewall Disconnects your PC from the
32. ter is connected to the Internet directly through a modem ISDN DSL cable modem T1 line or another direct connection Only programs specified in Rules will be permitted access Switch Mode CoGen Personal Firewall has three preset modes you can select Standard Mode Shopping Mode and Silent Mode The Screen Saver Locked and Logged Out modes are enabled automatically when your computer is in these respective states PassWatcher Mode will be enabled automatically when a program specified in the PassWatcher tab is running There are two ways to change the mode Method 1 1 Open the CoGen Personal Firewall main window refer to Start Firewall 2 Select Actions gt Switch Mode and click the preferred mode Method 2 1 Right click the CoGen Personal Firewall icon in the system tray 2 Select Switch Mode in the pop up menu then select the preferred mode Lf For more information refer to Menus General Settings Select Language If your edition of CoGen Personal Firewall includes support for multiple languages you can select the language as follows 1 Open CoGen Personal Firewall main window 2 Select Settings gt Select Language 3 Choose your preferred language in the pop up window then click OK Select Skin gt Steps 1 Open the CoGen Personal Firewall main window 2 Select Settings gt Select Skin and choose the preferred skin View Log There are three ways to open the Log file Click the View Log butt
33. then select Edit to open Edit Whitelist Rule prompt 2 Edit the items then click Save to complete this edit or click Cancel to give up this edit L You can also double click the item to open Edit Whitelist Rule prompt Delete 1 Select and highlight the rule to delete then select Delete button or right click the rule and select Delete in the pop up window 2 Select OK to delete Lf You can also press Delete key to delete the selected rule LF With Ctrl and Shift keys multiple rules can be selected Ports You can allow or deny communications with selected ports by creating rules gt Display e The list displays the port permission protocol and computer for the selected rule e Checked items will take effect gt Related Operation Add 1 Click Add button or right click the item and select Add to open Add Port Rule window 2 Input port protocol computer permission then click OK LF When the port numbers are input several ports can be separated by commas e g 2 4 8 10 Edit Add Port Rule eg 2 48 10 Protocot e TCP Ei UDF Computer Local Remote Permission Dery Allow Cancel 1 Select and highlight the rule to be edited Right click the rule and select Edit in the popup menu to open Edit Port Rule window 2 Edit the item then click Save to finish or click Exit to give up the edit Lf You can also double click the item to open Edit Port Rule window Delete 1 Select a
34. us to change or Next to continue Step 9 If you selected Scan memory for viruses before installing in the previous step then a memory scan will be performed This process may take 3 5 minutes Select Skip to abort the scan and continue the installation Your Security Our Concern 2007 CoGen Media All rights reserved fe CoGen Personal Firewall CoGen Memory Scan wil find and remove viruses in your current system memory prior to installing CoGen Personal Firewall If you are sure there are no viruses in your system memory you can click Skip to continue Scanning memory svchost exe gt gt C WINDOWS system32 colbact DLL Step 10 After installation is complete you can choose either to Run CoGen Personal Firewall or Run Registration Wizard Click Finish to complete the installation More Lf After the software is installed for the first time and if you have checked Run Registration Wizard the program will automatically try to connect to CoGen website You can only enjoy normal update service after you complete product registration and activate the User ID which is printed in User Identification Card on the first page of User s Manual After you purchase CoGen Antivirus please connect to CoGen website for registration as soon as possible fe CoGen Personal Firewall i CoGen Personal Firewall has been installed successfully Run CoGen Personal Firewall Step 11 Input your Product Key and
35. whether to delete the existing rule during import You can choose Yes No or Cancel gt Export You can export self defined PassWatcher rule s to the rule file fwr by clicking the Export button Input the file name in the pop up window and click Save If the file you select already exists you will be asked whether to overwrite it during export gt Trusted Trusted Modules refer to modules which are sure to be secure or modules for different programs that will be allowed access You can add trusted modules by either of the two methods below o Click the Trusted button and click Add in the pop up window then add the modules that will be permitted to access the program into the trusted module list gt When a listed program is running and a module is attempting access a pop up prompt will appear Click Details in the pop up prompt then check the boxes next to the trusted modules Check Allow the selected module to access the procress and click OK tcher Alert Exit Pass Wwatcher mode ne following modules tried to access 4 program protected by CoGen One or more modules tried to C CAWINDOWS SE xplorer EXE C1 C AWINDOWS system32 sass exe O CAWINDOWS system32 ustheme dll C1 C Program Files Virtual Machine Additions vmsrvc exe change settings To delete the trusted module please click Trusted button and click the module to be deleted in the pop up window then click Delete button and press Yes to confirm

Download Pdf Manuals

image

Related Search

Related Contents

Samsung 2023NW User Manual  ISTRUZIONI PER L`USO  Bogen AMT-12 User's Manual  S、Hシリーズ用  Paradyne 12-Port User's Manual  VistaQuest VQ 5020 User's Manual  ƒ^ƒJƒ‰ƒ{ƒCƒ‰ [  

Copyright © All rights reserved.
Failed to retrieve file