Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Create policies to automatically inventory software packages or systems and add authorized applications to a whitelist. 

  • Create policies to whitelist trusted file owners or digital certificates.

  • Elevate privileges for standard users.

  • Implement the principle of least privilege, that is require each subject in a system is granted the most restrictive set of privileges necessary for them to perform their tasks, to limit damage that can result from accident, error, or unauthorized use. (For details about how to protect your system from malicious behavior, go to Restrict an Application's Process Rights.) 

 

Info
titleNEW!

What's New In ACS 8.1

  • Support for reputation providers (such as VirusTotal)
  • Ready configuration of Microsoft's Enhanced Mitigation Experience Toolkit to detect and block software exploits (for details, go to Enhanced Mitigation Action Settings)
  • Application Sandboxing, which limits the environments where certain code can execute (for details, go to Application Sandboxing)

...

  • Apply security ratings to withstand future attacks by reducing the number of applications that are available to exploitation. (For more information, go to Manual Security Rating Filters.)
     
  • Isolate applications to protect against file system and registry corruption or misuse. You can achieve this goal by integrating with Altiris® Software Virtualization SolutionTM software. (For more information, go to Run an Application in a Workspace Virtualization Layer.)
     
  • Protect against data theft by automating the encryption of documents utilizing ACS's seamless integration with Windows Encrypted File System. (For more information, search Microsoft for EFS Encryption, or go to Automate Document Encryption.)

  • Control an application's ability to read or write to specific network locations. (For more information, go to Prevent Read and Write to File Types or Network Locations.)
     
  • Prevent potentially malicious applications, such as keyloggers, from installing Windows API hooks. (For more information, go to Restrict Malicious Applications)
     
  • Protect against viruses and spyware. (For more information, go to Quarantine Files.)

Standard Use Cases

For sample scenarios that highlight the functionality and use of this solution, go to Standard Use Cases.