At the ShieldsUp! Test I got this results (none of my ports were open, by the way).
Ping Reply: RECEIVED (FAILED) — Your system REPLIED to our Ping (ICMP Echo) requests, making it visible on the Internet. Most personal firewalls can be configured to block, drop, and ignore such ping requests in order to better hide systems from hackers. This is highly recommended since "Ping" is among the oldest and most common methods used to locate systems prior to further exploitation.
I’ve tried adding a rule do discard all ICMP packets… (Block), but that didn’t work. How can I make sure I pass that test and block the ping reply?
In the forum fro the latest beta (18.104.22.168), egemen has posted a couple of screen shots of the rules for this version. Try replicating these rules in your version, particularly the zone and fragmentedICMP rules.