Off
Choosing this mode disables an opportunity to apply the restrictive rules to applications on and incoming connections to your computer, making it unguarded and vulnerable, although you still can monitor newly incipient connections, estimate traffic through Statistics and view the Journal which registers only allowed connections in this mode.
You can switch into this mode, for instance, from the Main Page: