Programs tab

Program name and status Access permission Pass-Lock Pass-lockEntry DetailAdd/OptionsMailSafe Setting

Click the numbers to learn about specific controls, or read an introduction.

 


Programs tab

Use this tab to:

  1. Grant or deny access permission and server permission to your programs
  2. Add programs to the list and establish their permissions
  3. Review your settings
Program permission symbols

A green check means the program is allowed access/server rights.

A red X means the program is denied access/server rights.

A blue question mark means ZoneAlarm Pro will display a Program alert when the program asks for access/server rights.

Note: By default, programs to which you give access or server permission can use all ports. For additional security, use the Ports tab to limit the ports a program can use.


Tip You can sort the programs in the list by any field. Click on the field header to sort. The arrow icon indicates the sort order.

Related Topics

Back to top


Program name and status

As you use your computer, ZoneAlarm Pro detects every program that requests network access and adds it to this list. It also records the answer you gave to the Program alert for that program. A green bullet in the Active column means the program listed is currently accessing network resources. The program column displays the program name and associated icon.

Tip For more information about a program, click the program name, then look in the Entry Details box at the bottom of the screen.

Related Topics

Back to top


Access permission / Server permission

Use these fields to establish access permission and server permission for a program.

Left-click menu

To change a permission setting, click the symbol, then select from the shortcut menu.

Right-click menu

Right-click anywhere in the program's row to select from a variety of other options. See the table below for a description of each option.

 


Menu item

Description

Changes Frequently

If this option is selected, ZoneAlarm Pro will use only file path information only to authenticate the program. The MD5 signature will not be checked.

Caution This is a low-security setting.

Options

Opens the Program Options dialog box, in which you can customize port permissions and security options for the program.

Properties

Opens your operating system's properties dialog box for the program.

Remove

Deletes the program from the list.

Add program

Opens an explorer window so you can browse to a program on your computer that you want to add to the list.

 

Note Built-in rules ensure a consistent security policy for each program. Programs with access to the Internet Zone also have access to the Trusted Zone, and programs with server permission in a Zone also have access permission for that Zone. This is why (for example) selecting Allow under Trusted Zone/Server automatically sets all of the program's other permissions to Allow.

Related Topics

Back to top


Pass-lock

A key symbol in this field indicates that the program has pass-lock privilege.

To give pass lock privilege to a program, click the lock column, then choose Pass-Lock from the shortcut menu.

To revoke pass-lock privilege, click the lock icon, then choose Normal from the shortcut menu.

Tip If you grant pass-lock permission to a program, and that program uses other applications to perform its functions (for example, services.exe), be sure to give those other programs pass-lock permission as well.

Related Topics

Back to top


Entry Detail

The entry detail box displays information about the program currently selected in the programs list.

Field

Information

Product name

The common name of the program, for example, Internet Explorer.

File name

The fully-qualified name of the executable file, for example, C:\\Program Files\Internet Explorer\IEXPLORE.EXE

Version

The version number of the program.

Created date

The date the program was created by its manufacturer.

File size

The size of the executable file


Related Topics

Back to top


Add/Options buttons

Use these buttons to add a program to the programs list, or to access program options for the currently selected program.

Click Add to add a program to the programs list.

Click Options to access the Ports tab and Security tab in the Program Options dialog box.

For more information about the Program Options dialog, see the related topics, Ports tab and Security tab.

Related Topics

Back to top


Related Topics

Program control
Privacy protection
Ports tab
Security tab

Back


Glossary

pass-lock
When the Internet Lock is engaged, programs given pass-lock permission can continue accessing the Internet. Access permission and server permission for all other programs is revoked until the lock is opened.

Back

access permission
Access permission allows a program on your computer to initiate communications with another computer. This is distinct from server permission, which allows a program to "listen" for connection requests from other computers. You can give a program access permission for the Trusted Zone, the Internet Zone, or both.

Several common applications may need access permission to operate normally. For example, your browser needs access permission in order to contact your ISP's servers. Your e-mail client (for example, MS Outlook) needs access permission in order to send or receive e-mail.

The following basic options are available for each program:

Allow the program to connect to computers in the Internet Zone / Trusted Zone

Block the program from accessing computers in the Internet Zone / Trusted Zone

Ask whether the program should have access permission (show Repeat Program alert)

Back

server permission
Server permission allows a program on your computer to "listen" for connection requests from other computers, in effect giving those computers the power to initiate communications with yours. This is distinct from access permission, which allows a program to initiate a communications session with another computer.

Several common types of applications, such as chat programs, e-mail clients, and Internet Call Waiting programs, may need server permission to operate properly. Grant server permission only to programs you're sure you trust, and that require it in order to work.

If possible, avoid granting a program server permission for the Internet Zone. If you need to accept incoming connections from only a small number of machines, add those machines to the Trusted Zone, and then allow the program server permission for the Trusted Zone only.

The following basic options are available for each program

Allow the program to listen for connection requests

Block the program from listening for connection requests

Ask me whether to allow the program to listen for connection requests (show Server Program alert)

Back