Home Support

Enhanced Firewall - Getting Started

Enhanced Firewall monitors all network traffic between your PC and the outside world to protect you from unauthorized communication and intrusions. This feature is designed to require minimal input from you. To ensure you are protected, all you need to do is keep Enhanced Firewall enabled and, when prompted, select the appropriate Enhanced Firewall profile for each network that you connect to. Enhanced Firewall is a feature in AVG Internet Security.

Refer to the relevant sections below for instructions on using Enhanced Firewall in AVG Internet Security.

Disable Enhanced Firewall

To ensure your full security, Enhanced Firewall is enabled by default. We recommend keeping Enhanced Firewall enabled at all times, unless you need to disable it temporarily for troubleshooting purposes. To disable Enhanced Firewall temporarily:

  1. Open the AVG Internet Security user interface and click the Hacker Attacks tile.
  2. Click the green (ON) slider above Enhanced Firewall.
  3. Specify for how long Enhanced Firewall will remain disabled, then if prompted by the AVG Component stop dialog, click OK, Stop.

Enhanced Firewall is now temporarily disabled. To manually re-enable it, follow step 1 above, then click the red (OFF) slider so that it changes to green (ON).

Define network profiles

This feature allows you to define network profiles based on the networks you're connected to. The profiles monitor all communication between your PC and the web. To select the appropriate profile for each network:

  1. Open the AVG Internet Security user interface and click the Hacker Attacks tile.
  2. Click Firewall optionsNetwork profiles.
  3. Click the drop-down menu in the Profile column to select one of the following profiles for each network you're connected to:
    • Private: a lower level of security suitable for when your PC is connected to a trusted network, such as your home or work network. This profile enables better connectivity, and permits all communication within the network.
    • Public: a higher level of security suitable for when your PC is connected to a public network, such as a cafe or airport network. Because public networks present greater security risks, no incoming communication is permitted when this profile is selected.
When no profile is selected, the default profile is Public.

View logs

The Logs screen displays all records of activity history. You can configure the table to show specific activity, or search for a specific criteria in the table. To access the logs:

  1. Open the AVG Internet Security user interface and click the Hacker Attacks tile.
  2. Click Firewall optionsLogs.
  3. Search the Enhanced Firewall logs table with the following tools:
    1. Next to Show log for, click the drop-down menu and select an activity type to view either Blocked traffic or Rules in the table.
    2. Next to Show for last, define a time frame and time unit to see activities within a specific time period.
    3. Tick the box next to Filter, then type your search into the relevant search fields that appear. Each search field corresponds directly to the column underneath it.
    4. Next to Clear logs older than, define a time frame and time unit to delete selected log files.

To return to the main Enhanced Firewall screen, click Close in the bottom-right corner of the Enhanced Firewall logs screen.

Optimize application rules

Enhanced Firewall creates rules each time an application or process starts for the first time. These rules determine how Enhanced Firewall behaves toward each application or process when it connects to the internet or to another network. You can set connection allowances for each individual application to determine how strictly Enhanced Firewall monitors any incoming or outgoing communication. However, we recommend you only modify your Application Rules if absolutely necessary. Usually Enhanced Firewall can optimize rules without your input. To access Application Rules:

  1. Open the AVG Internet Security user interface and click the Hacker Attacks tile.
  2. Click Firewall optionsApplication Rules.
  3. Manage the following options on the Application Rules screen:
    • Organize application rules by vendor name
    • Adjust access restrictions
    • Set actions for unauthorized connections
    • Specify authorized ports
    • Access Packet rules
We recommend only changing these settings if you have advanced knowledge of Enhanced Firewall concepts.

For more information about Application Rules, refer to the following article:

Configure settings

Advanced users can configure additional Enhanced Firewall settings by clicking Settings (the gear icon) in the top-right corner of the Hacker Attacks screen. The following settings are available:

  • Disable Enhanced Firewall: Click the green (ON) slider at the top of the settings screen, then select a time duration. We do not recommend the Stop indefinitely option.
  • Show notification about newly created 'allow' rules: Tick the box next to this setting to receive notifications when Enhanced Firewall allows or blocks a new communication path.
  • Internet Connection Sharing mode: Allows a trusted user to connect to the internet through your PC, or to troubleshoot problems with devices, such as a printer that is connected to the internet via your PC. Ticking this option opens certain ports which are usually closed, decreasing the level of security.
Always untick this option when the user no longer needs access to your internet connection or you finish troubleshooting.
  • Enable automatic port scan detection: Authorizes Enhanced Firewall to detect port scan attempts. Port scanning is a technique hackers commonly use to identify vulnerable or unsecure devices on a network. If Enhanced Firewall detects a port scan, the offending IP address is blacklisted and all communication with that IP address is blocked until you reboot your PC.
  • IP block timeout: Configure how far back Enhanced Firewall searches network traffic history for suspicious network packets. 1800000 is the default value, which is equal to 30 minutes. Increasing this value can lead to false positive detections.
  • For programs with no defined rules, do the following: Use the drop-down menu to define what Firewall will do when it detects a new communication path.
  • System Rules: Click this button to configure individual predefined system rules. For more information, refer to the following article:
  • Packet Rules: Click this button to configure communication settings according to connection type. For more information, refer to the following article:
  • List of network profiles: use the drop-down menu in an individual network panel to configure the network profile.
We recommend you only configure System and Packet rules if you have advanced knowledge of Enhanced Firewall concepts. Enhanced Firewall is already configured to provide the appropriate firewall protection in most cases.
  • AVG Internet Security 20.x
  • Microsoft Windows 10 Home / Pro / Enterprise / Education - 32 / 64-bit
  • Microsoft Windows 8.1 / Pro / Enterprise - 32 / 64-bit
  • Microsoft Windows 8 / Pro / Enterprise - 32 / 64-bit
  • Microsoft Windows 7 Home Basic / Home Premium / Professional / Enterprise / Ultimate - Service Pack 2, 32 / 64-bit

Was this article helpful?

Still looking for answers ?

Visit our AVG Support Community or contact us here: