...
Application Context Filters | Description |
---|---|
Interactive Users | You can apply policies to applications with interactive users. Select the appropriate check box and enter policy details in the fields provided. |
LocalSystem and Service applications | You can apply policies to LocalSystem and Service applications. Select the appropriate check box and enter policy details in the fields provided. |
Service Applications | You can apply policies to Service applications. Select the appropriate check box and enter policy details in the fields provided. |
Commandline Filters | Description |
| You can create application filters that are based on the commandline of the running application.
|
Environment Variables Filters | Description |
Manual Application Compatibility Setting | You can use this predefined filter for application compatibility. |
User Requested Run As Administrator | You can use this predefined filter for the right click self-elevate option. |
Network Location Filters | Description |
| You can create application filters that are based on which network the computer is attached to.
|
Secondary File | Description |
| You can create application filters that are based on the applications file target which is taken from the commandline.
|
Signed Applications | Description |
Microsoft Signed Applications | You can create a filter by associating a digital certificate.
|
Time of Day | Description |
| You can create a filter using certain hours.
|
User Context | Description |
| You can create filters based on the group membership of the user. |
File Filters
Application Compatability | Description |
---|---|
| You can use or create these filters to filter by whether or not administrative privileges are required. |
Drive Type | Description |
| You can use or create these filters for what type of media or where an application is launched from. |
Executable Filters | Description |
Instant Messaging Applications -
| You can apply security policies to any of the listed Instant Messaging applications. If any of these applications are installed in the future, you can automatically add them to a policy. You can:
|
Internet Browsers -
| You can apply a security policy to the listed Internet applications. You can configure it the same as Instant Messaging Applications, above. |
Mail Clients -
| You can apply a security policy to the listed mail applications. You can configure it the same as Instant Messaging Applications, above. |
Media Players -
| You can apply security policies to the listed Media Player applications. If any of these applications are installed in the future, you can automatically add them to a policy. You can configure them the same as Instant Messaging Applications, above. |
MS Office Suite -
| You can apply security policies to the listed Microsoft Office Suite applications. If any of these applications are installed in the future, you can automatically add them to a policy. You can configure them the same as Instant Messaging Applications, above. |
Secondary File Executable Headers | Description |
| User Context You can create application filters that are based on the applications file target which is taken from the commandline.
|
Signed Applications | Description |
Microsoft Signed Applications | You can create a filter by associating a digital certificate.
|
Time of Day | Description |
| You can create a filter using certain hours.
|
use these to filter an executable filter by type based on it's header. | |
File Owner | Description |
| You can use these filters to specify if an application should or should not be launched based on who the owner is. |
File Specifications | Description |
| You can use these filters to use the Default File Specification. |
File Types | Description |
| You can use these filters to specify the extension of a file or MIME type to filter. |
Manifest | Description |
| You can use these filters to filter programs that manifest administrative rights are needed. |
Security Catalogs | Description |
| You can create use these filters to filter programs based on the group membership of the userif they are found in the Security catalog. |
Standard Inventory Filters
Filter | Description |
---|---|
File Parameter Collections | Collections listing all executables found with a specific paramter discovered by File Inventory on your managed computers. This collection can't be edited. |
Security Rating | This folder contains:
|
All Executable Files Discovered in Last 2 Weeks | Collection listing all executables files discovered by File Inventory on your managed computers in the last two weeks. This collection can't be edited. |
All Executable Files Discovered in Last Day | Collection listing all executables files discovered by File Inventory on your managed computers in the last day. This collection can't be edited. |
All Executable Files Discovered in Last Month | Collection listing all executables files discovered by File Inventory on your managed computers in the previous month. This collection can't be edited. |
All Executable Files Discovered in Last Week | Collection listing all executables files discovered by File Inventory on your managed computers in the last week. This collection can't be edited. |