You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: wiki/Getting-started.md
+20-10Lines changed: 20 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,34 +12,45 @@ The daemon should start intercepting connections, prompting you to allow or deny
12
12
13
13
<br/>
14
14
15
-
When you open the GUI, you'll see all the connections and processes that the daemon has intercepted. If you don't see connections being made, or anything in <kbd>Status</kbd> or <kbd>Version</kbd>, make sure you've [installed](../Installation) the daemon package as well, not just the GUI. For other GUI issues, see the [known GUI problems(../GUI-known-problems).
15
+
When you open the GUI, you'll see all the connections and processes that the daemon has intercepted. If you don't see connections being intercepted, or anything in <kbd>Status</kbd> or <kbd>Version</kbd>, make sure you've [installed](../Installation) the daemon package as well, not just the GUI. For other GUI issues, see the [known GUI problems](../GUI-known-problems).
16
16
17
-
Double click on a row to view the details of a process, rule, host or user.
17
+
Double click on a row of any view to review the details of a process, rule, host or user.
18
+
19
+
<imgwidth="957"height="558"alt="Captura de pantalla de 2026-02-11 23-58-49"src="https://github.com/user-attachments/assets/a41bf2be-db2d-4c57-acea-805805dfe088" />
20
+
21
+
22
+
<imgwidth="956"height="555"alt="Captura de pantalla de 2026-02-11 23-48-43"src="https://github.com/user-attachments/assets/ba829001-889d-4044-b1b8-d08df717e897" />
> **Tip:** Configure the default action to Allow (<kbd>Preferences -> Pop-ups -> Action</kbd>, and optionally check [x] <kbd>Disable pop-ups</kbd>), let it run for a while (hours, days, weeks), and observe passively what your machine is doing.
<imgwidth="802"height="551"alt="Captura de pantalla de 2026-02-11 23-58-4999"src="https://github.com/user-attachments/assets/55f0a7da-18fa-498f-a0f1-643a59dd9c22" />
31
+
27
32
28
33
This action has two advantages: you'll learn about your system and OpenSnitch will create the rules for you (<kbd>Rules</kbd> tab -> Temporary).
29
34
30
35
Remember to change it back to Deny.
31
36
32
-
<br/><br/>
37
+
<br/>
33
38
34
-
To see and modify the rules accumulated so far, click on the OpenSnitch icon in the System Tray. A GUI listing the rules will appear. You can click on each rule and then click on the Trash Can icon to delete it. Or you can click on a rule and right-click on it to modify allow/deny or duration etc. The list may take up to 15 seconds to show the update in the GUI. Note: if you modify the action of a rule (e.g. change from deny to allow), the name of it may not change (e.g. may stay as "deny-...").
39
+
To view and modify the rules accumulated so far, click on the OpenSnitch icon in the System Tray. A GUI listing the rules will appear.
40
+
You can click on each rule and then click on the Trash Can icon to delete it. Or you can click on a rule and right-click on it to modify allow/deny or duration etc. The list may take up to 15 seconds to show the update in the GUI.
41
+
42
+
Note: if you modify the action of a rule (e.g. change from deny to allow), the name of it may not change (e.g. may stay as "deny-...").
43
+
44
+
<imgwidth="995"height="456"alt="Captura de pantalla de 2026-02-11 23-38-13"src="https://github.com/user-attachments/assets/0d20156f-24be-4a3c-9dc7-5b328d37d449" />
Once you know which are the common processes, IPs and hosts that your machine is connecting to, you can start creating permanent rules (Duration: always) to deny or allow them. You can also convert temporary rules to permanent by right-clicking on a temporary rule or by double-clicking on it, and then edit it.
49
+
Once you have identified the common processes, IP addresses and hosts that your machine is connecting to, you can start creating permanent rules (`Duration: always`) to deny or allow them. You can also convert temporary rules into permanent ones by right-clicking on a temporary rule or by double-clicking on it, and then edit it.
50
+
51
+
<imgwidth="995"height="329"alt="Captura de pantalla de 2026-02-11 23-38-14"src="https://github.com/user-attachments/assets/23476660-ce39-4b4b-bbbc-4bfda4decc11" />
A common practice is to apply a rule of "Least privilege", i.e., block everything by default and allow only those processes or connections that you want to.
45
56
@@ -48,7 +59,6 @@ A common practice is to apply a rule of "Least privilege", i.e., block everythin
0 commit comments