The application log stores information on all attempts of applications installed on your computer to connect to a network.
 For details on a certain option, click the corresponding item in the picture.
To get information on options available on other pages, click the corresponding item in the picture.
Column
|
Description
|
Time
|
The date and time of the connection attempt.
|
Application
|
The full path to the application executable file, its name and process identification number (PID).
|
Rule name
|
The name of the rule applied.
|
Direction
|
The direction of the connection:
•Inbound – the rule is applied when someone from the network attempts to connect to an application on your computer. •Outbound – the rule is applied when an application on your computer attempts to connect to the network. •Any – apply the rule regardless of packet transfer direction. |
Action
|
The action Firewall performed when the connection attempt was detected:
•Block packets – the connection is blocked •Allow packets – the connection is allowed |
Endpoint
|
The protocol, IP address, and the port used for the connection.
|
On this page, you can save the information to a file or clear the log.
To save log
Click Save, then enter the file name where to store the log.
To clear log
To delete all information from the log, click Clear.
|