How to configure the firewall so that it does not miss unsigned applications on the network? Many cases when potentially dangerous applications, the firewall passes to the network, it was possible to configure the firewall earlier, for more aggressive behavior, to unsigned processes.