Pros
- Gives users plenty of control
- Provides effective security by blocking malicious outgoing connections
Cons
- Doesn’t give much explanation for certain cryptic connections
- Takes some effort to train
- Could provide more options for common connections

