Skip to content
Skip to main content

About this free course

Share this free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

1.2 Configuring your own firewall

In this section you will locate the personal firewall on your own computer and, if necessary, make modifications to its settings to provide the best possible protection.

You will need to have Administrator level access to the computer you use as you will be making changes to important parts of the operating system. If you do not have these permissions, request temporary administrator rights from the machine’s owner.

If your computer is in an office environment, or is supplied by your employer, please check that you are permitted to change the firewall settings before attempting this section. Many employers have preferred settings that are maintained by specialist staff and you should not attempt to change them without permission.

If you use Windows 7 or Windows 8, continue with the next part ‘Configuring your own firewall (PC)’.

If you use a Mac, go straight to ‘Configuring your own firewall (Mac)’.

Configuring your own firewall (PC)

Download this video clip.Video player: ou_futurelearn_cyber_security_vid_1116.mp4
Copy this transcript to the clipboard
Print this transcript
Show transcript|Hide transcript
 
Interactive feature not available in single page view (see it in standard view).

Locate the personal firewall on your own computer and, if necessary, make modifications to its settings to provide the best possible protection.

Download the PDF [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)]   of these instructions to keep as reference.

You can skip the next part, unless you also own a Mac and want to configure a firewall for this as well.

Configuring your own firewall (Mac)

Download this video clip.Video player: ou_futurelearn_cyber_security_vid_1117.mp4
Copy this transcript to the clipboard
Print this transcript
Show transcript|Hide transcript
 
Interactive feature not available in single page view (see it in standard view).

Locate the personal firewall on your own computer and, if necessary, make modifications to its settings to provide the best possible protection.

Download the PDF of these instructions to keep as reference.

Other firewalls

Other firewalls are available either to download or as software packages that can be bought from retailers.

You may prefer to use one of these programs, but if you do, please remember:

  • you should only keep one firewall running at a time since multiple firewalls will not offer significantly better protection and can interfere with one another
  • you must keep one firewall running at all times.

Once you’ve set up your personal firewall, identify a type of traffic that you might want to allow (or deny) on your computer.