/

On-Premise Firewall

Manage devices that have been blocked due to security policy violations. View block reasons, unblock devices, and understand how devices get added to the blocklist.

On-Premise Projects Only

This page applies to On-Premise, Desktop, Mobile, and IoT project types. For Cloud / Web / API projects, see Cloud Firewall.


Blocked Devices

The Firewall tab for on-premise projects shows a single table listing all devices that have been blocked.

ByteHide Monitor On-Premise Firewall showing Blocked Devices table with device name, ID, operating system, block reason, and dateClick to expand

ColumnDescription
Device NameName of the blocked device
Device IDUnique device identifier (full hash)
Operating SystemOS and version (e.g., Windows 10.0.26200.0)
Block ReasonWhy the device was blocked (e.g., security policy violation, manual block)
Blocked DateTimestamp of when the block was applied
ActionsUnblock button to remove the device from the blocklist

How Devices Get Blocked

Devices can be blocked in two ways:

Manual Block

From the Device Details page, click Block Device to manually add a device to the firewall blocklist. This is useful when you identify a compromised device through the incident dashboard or session analysis.

Automatic Block

Configure Workflow Rules to automatically block devices when specific threats are detected. For example, you can create a rule that blocks any device where Tampering Detection or Debugger Detection triggers with a Close action.


Unblocking a Device

To unblock a device:

  1. Find the device in the Blocked Devices table
  2. Click the unblock button in the Actions column
  3. The device is immediately removed from the blocklist and can connect again

You can also unblock a device from the Device Details page by clicking Unblock Device.


Device Actions

In addition to blocking and unblocking, you can take other actions on devices from the Device Details page:

ActionDescription
Clear MemoryRemotely clear sensitive data from the device's application memory
Delete FilesRemotely wipe application files on the device
Block DeviceAdd the device to the firewall blocklist
Unblock DeviceRemove the device from the firewall blocklist

See Devices & Sessions for full details on device management.


Next Steps

Devices & Sessions

View device details, security status, and session history

Workflow Rules

Automate device blocking based on detected threats

Cloud Firewall

IP, bot, country, and threat actor blocking for cloud projects

Previous
Overview