Outpost Firewall Pro delivers proactive defense against hackers, spyware, Trojans, botnets, keyloggers, ID theft and other Internet-borne threats.
The integrated anti-spyware module defends against the broad range of malicious programs. Its on-demand scanner enables scanning custom locations, while the real-time monitor is constantly on guard against the activation of spyware. File checks complete much faster because the SmarScan2-driven engine examines only items altered since the last scan.
The award-winning bidirectional firewall guards users' network access, keeping them safe from inappropriate or malicious connections, loss of private data, unwanted program activity and risky URLs. The firewall's unique Attack Detection protects LANs against man-in-the-middle attacks and other sophisticated intrusions.
The Host Protection module takes a new approach to combating malware: it pre-empts the infection by examining the behavior of a monitored object, proactively blocking it from performing any unauthorized activity. This type of defense-in-advance helps to halt unknown malware before it can activate its destructive payload.
Special tamper-proof technologies that safeguard the integrity of Outpost components ensure the program cannot be deactivated by targeted attacks.
The versatile Web Control module safeguards you against the Internet's darker side. It steers you away from malware-hosting sites, prevents inadvertent disclosure of personal information, limits your exposure to potentially unsafe web properties and keeps your identity private.
Outpost offers advanced users broad flexibility in designating personal and specific firewall policies and program behavior rules however you desire, yet it is suitable for inexperienced users to work with. Thanks to automated configuration, the collaborated ImproveNet system of sharing settings, the Smart Advisor usage hints, Outpost is incredibly easy to use.
* Preemptive threat protection
Outpost Firewall Pro provides the first line of defense against malicious software by proactively controlling how programs behave and interact on a PC and preventing security breaches. The Host Protection module proactively monitors for and blocks sophisticated hacking techniques used to compromise or steal data. By analyzing threats and displaying actionable alerts, Host Protection blocks zero-day attacks and other unauthorized activities, providing advanced protection against botnets, rootkits and inadvertent data disclosure.
New! This latest version extends the range of monitored events and operations for even greater and more customizable protection. Outpost excels in all currently-known leaktests, with additional focus on keylogger-like activities.
Today's malware frequently seeks to shut down security software to make its own infection process easier. By incorporating solid tamper-proof protection for all its components, Outpost Firewall Pro makes it impossible for anyone except the authorized user of the program to disable or close active protection.
* Essential spyware protection
Outpost's Anti-Spyware module safeguards PCs against the threat of spyware, which can range from displaying annoying ads to hijacking your browser homepage to stealing your identity and confidential data. Spyware is blocked at every possible stage installation, activation, transmission of information and re-installation. The on-demand scanner scours the system for traces of deactivated spyware and erases them completely.
Network Security & Continuity
* Connection security
The two-way firewall monitors your computers inbound and outbound connections and prevents local and remote unauthorized network access. It conceals access ports, making your presence on the Internet invisible. The Ethernet Protection module guards your network connections and prevents insider attacks by controlling the transmission of data over the network. This eliminates the potential risk for data such as chat windows or authenticated browser sessions to be delivered to the wrong destination or intercepted while in transit.
* Application access control
The firewall controls which programs are allowed to access the Internet, proactively protecting your PC against both zero-day threats and malware attempts to phone home.
* Comprehensive coverage
Outpost Firewall Pro secures all types of connections (Ethernet, WiFi, DSL, cable, cellular, and dial-up), automatically applying the necessary security settings when the computer is connected to a new provider.
* Intrusion protection
The Attack Detection module automatically blocks known types of hacker attacks from entering your computer.
Privacy & Web Safety
* Unsafe web site access restriction
Outpost Firewall Pro can optionally alert and block access to potentially malicious or unwanted web sites based on a predefined list of URLs. This filtering ensures you wont become a victim of inadvertent drive-by malware infection or phishing attacks that are looking to steal your passwords, login information and other sensitive data. The list of blocked sites is updated via the automatic anti-spyware updates and can be edited to reflect your preferences.
* IP Blocklist keeps surfing clean
Based on the BlockPost plug-in in earlier Outpost versions, the integrated IP Blocklist lets users restrict access to specified Internet domains. A valuable tool for both sensitive individuals and concerned parents, IP Blocklist will deny incoming/outgoing connectivity to ill-intent Internet zones, such as those distributing spyware or delivering obnoxious ads and graphics spam. The blocked entries can either be manually defined or imported as an aggregated list from community-maintained sources.
* Safe repository for personal data
Any confidential information for example, bank account numbers and passwords that you define using ID Block is blocked from leaving the confines of your PC through communication channels such as IM, web or email. ID Block protects you against identity theft and phishing attacks that target personal confidential information. Plus, it ensures that no-one else including other members of your household - can accidentally or deliberately disclose this information on the web.
* Ad-free, anonymous surfing
By managing cookies and external referral URLs, Outpost lets you maintain a high level of privacy when visiting shopping, entertainment or news sites while at the same time allowing trusted sites to collect only the information needed to personalize pages for you. Additionally, Outpost Firewall Pro lets you limit the elements displayed on web pages, providing cleaner and faster browsing. You can even define which sites are permitted/not permitted to display images, rotate advertising banners, execute external code such as ActiveX or Java scripts, or deliver pop-ups. The latest version of Outpost ensures compatibility with even the most complex and sophisticated websites, delivering smooth performance and heightened online safety.
Tracking & Control
* Network activity monitoring
Outpost's Network Activity Monitor shows every connection your PC makes with other computers on the Internet or local network, so you can see what's happening on your PC at all times and quickly close down any unauthorized connections.
New! In the new 2009 version, connections can be grouped/ungrouped according to application, and you can quickly edit any existing rules right from the interface.
* Password-protection, multiple configuration profiles
You can set passwords to protect your configuration from accidental or deliberate modification, as well as create and use multiple configuration profiles to suit your current risk exposure. For advanced users, the ability to construct multiple restore points through the save/load configuration command is a big plus.
* Better manageable events logs
Outposts old Log Viewer showed the history of past events on a computer.
New! The new version improves on the Log Viewers clarity and manageability, adding support for per-category listings that can be sorted and filtered according to different user-specified criteria.
* IPv6 support
The new network connection protocol extensively used in Windows Vista, IPv6, is fully recognized, filtered and its data protected. The protocol is the evolution of its predecessor, IPv4, and provides a number of scalability, automation and security improvements.
* New! Driver certification and latest Windows platforms compatibility
Outpost has received WHQL (Windows Hardware Quality Labs) certification, meaning that its protection complies with Microsofts stringent quality, compatibility and stability requirements.
* Adaptive firewall rules
When traveling with your laptop, or changing ISP, you dont need to manually adjust your security for new connection settings - Outpost handles it automatically by designating connection-specific parameters such as DNS or gateway server addresses as environment variables.
* Entertainment mode for uninterrupted gameplay and video viewing
While you play full-screen games or watch videos on your PC, Outpost's Entertainment Mode ensures the program won't interrupt you with alerts if it detects new activity. New activity notifications are handled in the background without sacrificing current protection levels. You can customize which applications will automatically trigger the switch to Entertainment Mode.
Convenience and Ease of Use
* Auto-learning mode
When Outpost is first started, it runs in a special learning mode where all alert notifications are suppressed. During this time, the program is silently learning your typical program activity and firewall-monitored connections. After the learning period is over, Outpost reverts to normal mode and will prompt for a response only when new activity is seen, dramatically reducing the number of alerts requiring your involvement.
* Automatic configuration
Rules for most programs that access the Internet are applied automatically, relieving you of the need to enter rules manually every time a new application accesses the Internet or interacts with another program. This means that for most of the time, you wont need to deal with questions relating to Internet access, minimizing interruptions and minimizing risk exposure due to insecure configurations. Outpost includes a wide range of predefined access policies; these settings can be customized to your individual requirements at any time.
* ImproveNet delivers more ready-made configurations
ImproveNet is a voluntary system of program configuration aggregation and distribution. After being reviewed and approved by Agnitum engineers, rulesets submitted by Outpost users are distributed across the user base, providing you with the most secure and up-to-date rules for a wide range of activities and applications.
* SmartAdvisor - instant, context-sensitive help
If ImproveNet doesn't have the answer, SmartAdvisor is always on hand to help you make the right decision when configuring access information for an application.
* Hands-free updates
Whenever an update to Outpost Firewall Pro is released during your license period, the update module automatically retrieves the latest version from the Agnitum server and applies it as soon as you authorize it to do so.
* Analysis of digital signatures
The new method of application identification reduces the number of dialog windows users get. Thanks to the implementation of vendors digital certificates validation for Internet-active applications, qualifying programs are automatically assigned internet and local interaction permissions without asking a user. Digital certificates complement the existing practice of SHA-256 and MD5 checkups.
Changelog for this release:
# New! System and Application Guard to keep installed software and OS protected
# New! File and folder lock to restrict access to sensitive contents
# New! In Outpost 7 users can define a list of protected items such as Windows and typical web applications files and configuration settings. Those elements will then be protected against inappropriate access or malicious hijacking, thus bolstering the security and integrity of local data. # New! Program activity tracker to review system modifications in real time
450 MHz or faster CPU(x86/x64/multi-core), 256Mb RAM, 50 MB free disk space