Changing Low-level settings can cause problems with the performance of AdGuard, may break the Internet connection or compromise your security and privacy. You should only open this section if you are sure of what you are doing or our support-team has asked you about it.
To go to Low-level settings, click Settings —> General settings —> Advanced settings and scroll down.
Block Teredo when the WFP driver is selected
If you enable this feature, AdGuard will block Teredo when the WFP driver is selected.
Block TCP Fast Open
If enabled, AdGuard will block TCP Fast Open in the Edge browser. To apply settings, you need to restart the browser.
Exclude app from filtering by entering the full path
If you want AdGuard not to filter any application, specify the full path to it and the app will be excluded from filtering. Separate different paths by semicolons.
Enable AdGuard pop-up notifications
Enable this feature to see AdGuard pop-up notifications. They do not appear too often and contain only important information.
Automatically intercept filter subscription URLs
Enable this feature if you want AdGuard to automatically intercept filter subscription URLs (i.e.
abp:subscribe and alike) and to open a custom filter installation dialog.
Use redirect driver mode
If this option is enabled, AdGuard intercepts all the traffic and redirects it to the local proxy server for further filtering.
Otherwise, AdGuard will filter all the traffic on the fly, without redirection. In this case, the system will consider AdGuard to be the sole application that connects to the Internet (other applications are routed through it). The downside is that it will make the system Firewall less effective. The upside is that this approach works a little bit faster.
Open main window at system start-up
Enable this option to make the main AdGuard window open after the system is loaded.
If you want AdGuard to filter loopback connections, check the box.
Enable HAR writing
This option should be enabled only for debugging purposes. If you tick the checkmark, AdGuard will create a file that contains information about all filtered HTTP requests in HAR 1.2 format. This file can be analyzed with the Fiddler app. Note that it may slow down your web browsing significantly.
Allows displaying the QUIC protocol records in the filtering log. For blocked requests only.
Action applied to blocked DNS requests
Here you can select the way AdGuard will respond to DNS queries that should be blocked:
Custom IPv4 address
If “Custom IP address” is selected as an action applied to blocked DNS requests, here you should specify the IPv4 address that will be returned in response to blocked “A” requests.
Custom IPv6 address
If “Custom IP address” is selected as an action applied to blocked DNS requests, here you should specify the IPv6 address that will be returned in response to blocked “AAAA” requests.
Here you can specify an alternate server to which a request will be rerouted if the main server fails to respond within the timeout period specified in the next section. There are three options to choose from:
DNS server timeout period
In this block, you can specify the time in milliseconds that AdGuard will wait for the response from the selected DNS server before resorting to fallback. If you don’t fill in this field or enter an invalid value, the value of 5000 will be used.
List of custom fallback servers
If you want AdGuard to use custom fallback servers, list them in this section, one per line.
List of custom bootstrap addresses
A bootstrap is an intermediate DNS server used to get the IP address of the secure DNS server you chose earlier in
DNS-protection. Such a "middle ground" is needed when using protocols that denote the server address by letters (such as DNS-over-TLS). In this case, the bootstrap acts as a translator, transforming the letters into numbers your system can understand.
By default, the system DNS resolver is used, and the initial bootstrap request is made through port 53. If this does not suit you, list here the IP addresses of the DNS servers that will be used to determine the address of the encrypted DNS server. The specified IP addresses will be applied in the order listed. If you specify invalid addresses, or no addresses at all, the system IPs will be used.
All DNS requests to domains listed here will be redirected to the system default DNS server instead of the DNS server specified in the app’s settings. Also, DNS blocking rules will not be applied to such requests.