Serious Discussion Fort Firewall

@tnodir Can you please explain to me how zones work in fort firewall? There are three option but when I use use 3rd pic tick mark one it just disables the internet for that application but works in the greyed out option.

Screenshot 2025-08-02 042029.png
Screenshot 2025-08-02 042048.png
Screenshot 2025-08-02 042545.png
 
  • Like
Reactions: dronefox1166
@JustInTime App's zones can have 3 states:
- default disabled - the zone is not used
- included - app can connect only to these set zones
- excluded - app can not connect to these unset zones
So tick mark means app can only connect to these zones and grey box means app can't connect to these zones. Is it correct?
 
@JustInTime Yes, correct.

OTOH, you can block the WindowsSpyBlocker addresses for all apps by selecting it in the Options: IP Addresses: Internet: Block addresses.
 
Last edited:
  • Thanks
Reactions: JustInTime
@tnodir thanks a lot. Also is there any plan to make some changes in the UI? There are some really good features but right now everything feels scattered.
 
I was thinking of creating windows update app group which I can enable only when I want to update. Can anyone tell me what services to allow for windows update?
 
Fort Firewall 3.19.4
  • UI: MyFort: Add "Portable Installed" label (#634).
  • UI: Rule: Add "Log Allowed/Blocked Connections", "Terminate: Alert" flags (#241).
  • UI: Connections: Show alerted action icon (#241).
  • Driver: Add "option(log, nolog, alert)" filter function (#241).
  • Installer: Skip password checking on auto-update (#629).
 
Hi 🙂

First of all, thank you for your amazing work on Fort Firewall — I honestly think it’s already better than popular alternatives like GlassWire.

I’d like to let you know that if the next major stable version of Fort Firewall (v4, or even v5 if you need more time) passes WHQL (Windows Hardware Quality Labs) certification and is marked as HVCI-compatible (Hypervisor-protected Code Integrity), I would be very happy to support the project — either by purchasing a license or making a donation via PayPal.

I believe many other users would also greatly appreciate having Fort fully compatible with modern Windows security features without the need to disable Core Isolation.

For me, a lifetime license per major version sounds fair. Perhaps you could also discuss with Microsoft the possibility that minor updates under the same major version remain valid for HVCI certification.

And if you encounter difficulties with Microsoft regarding minor updates, I would gladly help by sending them some advertisements or raising awareness — at no cost to you.

Once again, thanks for building such a solid alternative firewall.

Best regards,

ps : don't be fear too much about Microsoft “stealing” your project.
Since Fort Firewall is open source (GPLv3), everything is public and timestamped. If Microsoft ever tried to copy your work, it would be very obvious to the community and damage their reputation. Also, your driver is technically different and independent from the Windows Firewall stack. If Microsoft ever wanted to integrate something similar, they would still need to rely on the signature of your driver (or build a new one from scratch) in order to give it the proper rights inside Windows. This is a strong protection of your originality, and even though GitHub is 100% owned by Microsoft today, the timestamps and the hashes of your code do not belong to them. These are cryptographic proofs, independent of ownership, which guarantee that your work can always be verified and attributed to you. This means that Microsoft cannot simply take your project and pretend it’s theirs — the history of your commits and the hashes will always protect your authorship.
 
Last edited:
  • Like
Reactions: tnodir