Firewall authenticity checking on custom rules

1. What actually happened or you saw:
Currently custom firewall rules will fail if a file is safe or even unknown. If you are an experienced programmer, you could easily bypass the personal firewall settings.
Arguments:
1º users use a lot of modified programs for any reason whatsoever;
2º can uninstall the applications and the path remain in the program;
3º users may be forced to disable the firewall for many reasons, among them, be temporarily disconnected and check if the program was the cause, for example;
4º shared computers may be that someone less a little more inexperienced than the inexperienced can be victims of malware and allow the execution to exploit this failure (fortunately or unfortunately it is not exclusive to the software)

2. What you wanted to happen or see:
Currently safe mode, all modules share reliable vendor functions, cloud verification, and file list;
But in custom settings, the permission to run a file will bypass checking the list of trusted suppliers and list of files;
Files in custom settings should be scanned both in the list of trusted files and in the list of files