You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I would like to reference #540 here and request a feature. I originally thought passive mode will silently allow and add rules individually for all processes and the endpoints they are contacting but I was wrong after reading the referenced issue. It's next to impossible to review everything while it happens so you are left with either drop everything or accept everything. I think it makes a lot of sense to add one more condition on top that keeps adding all these endpoints as allow rules corresponding to their respective programs so that the user can decide at a later date which endpoints to deny.
The text was updated successfully, but these errors were encountered:
This is amazing and I can confirm that it works. Only, I feel like I should've been more descriptive. Right now, all rules added for all programs are any address: any port which is not very useful because a later-in-time audit would involve all programs with list of all endpoints that they tried to connect to. The user might want to keep some core endpoints allowed and reject any suspicious or unnecessary ones. A program like a browser for example which is actually used to connect to all sorts of endpoints doesn't necessarily need to follow the same strategy, however.
I would like to reference #540 here and request a feature. I originally thought passive mode will silently allow and add rules individually for all processes and the endpoints they are contacting but I was wrong after reading the referenced issue. It's next to impossible to review everything while it happens so you are left with either drop everything or accept everything. I think it makes a lot of sense to add one more condition on top that keeps adding all these endpoints as allow rules corresponding to their respective programs so that the user can decide at a later date which endpoints to deny.
The text was updated successfully, but these errors were encountered: