...
- Apply security ratings to withstand future attacks by reducing the number of applications that are available to exploitation. (For more information, go to Manual Security Rating Filters.)
- Isolate applications to protect against file system and registry corruption or misuse. You can achieve this goal by integrating with Altiris® Software Virtualization SolutionTM software. (For more information, go to Run an Application in a Workspace Virtualization Layer.)
- Protect against data theft by automating the encryption of documents utilizing ACS's seamless integration with Windows Encrypted File System. (For more information, search Microsoft for EFS Encryption, or go to Automate Document Encryption.)
- Control an application's ability to read or write to specific network locations. (For more information, go to Prevent Read and Write to File Types or Network Locations.)
- Prevent potentially malicious applications, such as keyloggers, from installing Windows API hooks. (For more information, go to Prevent Malicious Applications from Running - old.)
- Protect against viruses and spyware. (For more information, go to Quarantine Files.)
Getting Started Scenarios
For sample scenarios that highlight the functionality and use of this solution, go to Getting Started and Standard Use Cases.
...