FortiClient Manager : Configuring FortiClient agent settings : Defining firewall applications on a FortiClient agent
 
Defining firewall applications on a FortiClient agent
Define applications so that you can create firewall policies to allow or deny network access to these applications. For information about creating firewall policies for applications, see “Creating firewall policies on a FortiClient agent”.
Create New
Select to create a firewall application.
Override
The FortiClient agent’s configuration includes those inherited from the group to which the computer belongs.
Selecting override allows you to modify the inherited firewall application configuration on this FortiClient agent. Deselecting override means that you want to use the firewall application configuration inherited from the group to which the computer belongs.
Even with inherited firewall application configurations, you can still create new firewall applications for a FortiClient agent.
Name
The name of the firewall application.
Details
The information about the firewall application, including its executable file name, size, and checksum.
Comments
Comments on the firewall application.
Action
Select the Delete icon to remove a firewall application, and Edit icon to modify a firewall application.
To define a firewall application:
1. In the FortiClient Manager, select Client/Group > Client > Managed Client in the navigation pane.
2. In the All Managed Clients list, select the FortiClient agent you want to configure from the Host Name column.
3. From the FortiClient menu, select Firewall > Application > Create New.
Name
Enter a name to identify the application.
Executable File
Enter the executable file name of application. For example, the executable of Internet Explorer is iexplorer.exe.
Optionally you can leave this field blank to define the service only by its ports.
File size
Enter the size of the executable file. If Executable File is blank, enter a value that is not the same as that of any other application executable file.
Checksum (CRC32)
Enter the CRC32 checksum of the executable file. If Executable File is blank, enter a value that is not the same as that of any other application executable file.
The checksum and file size are used to uniquely identify the application executable file.
Comments
Enter any comments on the firewall application.
4. Select OK.