Solved

make an exception in anti-virus firewall


How do I make an excetion in the anti-virus firewall for an ap called Zwift?
icon

Best answer by ProTruckDriver 18 January 2017, 23:15

Hello wideopenadv, Welcome to the Webroot Community Forum. :D
 
There are essentially 3 key areas where a user can override WSA.  These are essentially reached, from the main WSA panel, as follows:
 
  1. PC Security > Quarantine > Detection Configuration
  2. Identity & Privacy > Protected Applications
  3. Utilities > System Control > Control Active Processes
 
and once there the user usually has the options to:
 
  1. "Allow"
  2. "Protect/Monitor"
  3. "Block/Deny"
 
In the case of 1. Detection Configuration
 
If an item is set to:
 
- "Allow", WSA ignores it during scans and shield actions, meaning if it's a virus that has been allowed, it can continue acting as a virus acts.  Be careful of what you allow in this area and ensure it's something you trust implicitly if you are going to change the status from Block to Allow.
 
- "Monitor", WSA will watch the item to determine if it is legitimate or related to malware.  It is not necessary to add files into this list or set files to monitor manually unless you are changing them from a Block or Allow status.  This might be useful if for example you think Webroot might have had a false positive on something and you want to check again at a later time to see if the determination has changed.  You could set it to Monitor and have Webroot check it again.
 
- "Block", then WSA will treat the items as it would detected malware.  It will not be executed, and it will not be written to your hard drive.  Detected infections are automatically set to a Block status.
 
In the case of 2. Protected Applications (Internet Security & Complete version ONLY)
 
In this case:
 
- "Allowed applications" are not secured against information-stealing malware, and also have full access to protected data on the system. Many applications unintentionally access protected screen contents or keyboard data without malicious intent when running in the background. If you trust an application that is currently marked as "Deny," you can change it to "Allow."
 
- "Protected applications" are secured against information-stealing malware, but also have full access to data on the system. By default, web browsers are assigned to the "protected" status. If desired, you might also want to add other software applications to "protected," such as financial management software. When you run a protected application, the Webroot icon in the system tray displays a padlock.
 
- "Denied applications" cannot view or capture protected data on the system, but can otherwise run normally.
 
And finally, in the case of 3. Control Active Processes
 
If a process is set to:
 
- "Allow" it means WSA allows it to run on the system. It's important to note that if an item is already allowed here, that's because Webroot knows already from seeing the file before that it's ok to allow.
 
- "Monitor" status means WSA will journal what that program is doing and keep a very close eye on it for any suspicious activity.  Basically it would treat it as if it wasn't already sure about it one way or the other, and it wants to monitor it closely until it's sure about it.
 
- "Block" means just that...WSA does not allow it to run on the system.  Be very careful about what you block in this area and ensure that anything you decide to block is a non-essential process.  Otherwise, you could be setting yourself up for a lot of grief if you block something critical.
 
Just be very careful and be sure to only allow applications you know and trust.
 
Or you can contact Webroot Support to get it Whitelisted : Please submit a Support Ticket or Contact Webroot Support 
 
HTH,
Dave.;)
View original

3 replies

How do I make an excetion in the anti-virus firewall for an ap called Zwift?
Userlevel 7
Hello wideopenadv, Welcome to the Webroot Community Forum. :D
 
There are essentially 3 key areas where a user can override WSA.  These are essentially reached, from the main WSA panel, as follows:
 
  1. PC Security > Quarantine > Detection Configuration
  2. Identity & Privacy > Protected Applications
  3. Utilities > System Control > Control Active Processes
 
and once there the user usually has the options to:
 
  1. "Allow"
  2. "Protect/Monitor"
  3. "Block/Deny"
 
In the case of 1. Detection Configuration
 
If an item is set to:
 
- "Allow", WSA ignores it during scans and shield actions, meaning if it's a virus that has been allowed, it can continue acting as a virus acts.  Be careful of what you allow in this area and ensure it's something you trust implicitly if you are going to change the status from Block to Allow.
 
- "Monitor", WSA will watch the item to determine if it is legitimate or related to malware.  It is not necessary to add files into this list or set files to monitor manually unless you are changing them from a Block or Allow status.  This might be useful if for example you think Webroot might have had a false positive on something and you want to check again at a later time to see if the determination has changed.  You could set it to Monitor and have Webroot check it again.
 
- "Block", then WSA will treat the items as it would detected malware.  It will not be executed, and it will not be written to your hard drive.  Detected infections are automatically set to a Block status.
 
In the case of 2. Protected Applications (Internet Security & Complete version ONLY)
 
In this case:
 
- "Allowed applications" are not secured against information-stealing malware, and also have full access to protected data on the system. Many applications unintentionally access protected screen contents or keyboard data without malicious intent when running in the background. If you trust an application that is currently marked as "Deny," you can change it to "Allow."
 
- "Protected applications" are secured against information-stealing malware, but also have full access to data on the system. By default, web browsers are assigned to the "protected" status. If desired, you might also want to add other software applications to "protected," such as financial management software. When you run a protected application, the Webroot icon in the system tray displays a padlock.
 
- "Denied applications" cannot view or capture protected data on the system, but can otherwise run normally.
 
And finally, in the case of 3. Control Active Processes
 
If a process is set to:
 
- "Allow" it means WSA allows it to run on the system. It's important to note that if an item is already allowed here, that's because Webroot knows already from seeing the file before that it's ok to allow.
 
- "Monitor" status means WSA will journal what that program is doing and keep a very close eye on it for any suspicious activity.  Basically it would treat it as if it wasn't already sure about it one way or the other, and it wants to monitor it closely until it's sure about it.
 
- "Block" means just that...WSA does not allow it to run on the system.  Be very careful about what you block in this area and ensure that anything you decide to block is a non-essential process.  Otherwise, you could be setting yourself up for a lot of grief if you block something critical.
 
Just be very careful and be sure to only allow applications you know and trust.
 
Or you can contact Webroot Support to get it Whitelisted : Please submit a Support Ticket or Contact Webroot Support 
 
HTH,
Dave.;)
Userlevel 7
Hi wideopenadv
 
Welcome to the Community Forums.
 
If I may add to what PTD has posted...may I ask as to what you mean by 'make an exception'? Do you want to let Zwift communitcate through the firewall or do you want to block it?
 
When you ran it for the first time you should have been prompted to either Block, Allow Once or Allow Always, and as a result will have set up a rule in the firewall for Zwift.
 
If that is the case then you need to follow the 3rd of the 3 options that PTD has referenced in his post...but it really depends on your answer to my initial question.
 
Hope that helps further.
 
Regards, Baldrick

Reply

    Cookie policy

    We use cookies to enhance and personalize your experience. If you accept or continue browsing you agree to our cookie policy. Learn more about our cookies.

    Accept cookies Cookie settings