1. What logic is used to create new firewall application rules? Is there a whitelist?
2. What insurance is there that an allow rule won't be created for a rogue application? I had this happen and want to prevent this but at the same time do not want to have to use paranoid mode.
Thanks