Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Application-level security attacks, such as file system corruption, registry corruption, spyware, and keylogging pose a serious threat to mission critical business operations. Arellia Thycotic Application Control Solution™ (ACS) software helps you manage this risk by enabling you to control the software applications in your environment.

With ACS you You can perform do the following in ACS:

  • Create policies to automatically inventory software packages or systems and add authorized applications to a whitelist. 
     
  • Create policies to whitelist trusted file owners or digital certificates.
      Whitelisting, orangelisting, and blacklisting - control what applications are and are not allowed to be run on an endpoint, with the ability to orangelist applications that have not been classified.
  • Elevate privileges for standard users .
     - instead of end users seeing the UAC prompt, they can have installers, updaters and applications elevated automatically.
  • Implement the principle of least privilege, that is require is require each subject in a system is granted the most restrictive set of privileges necessary for them to perform their tasks, to limit  to limit damage that can result from accident, error, or unauthorized use. (For details about how to protect your system from malicious behavior, go to Restrict an Applicationapplication's Process Rightsprocess rights.) 
  • Apply security ratings to withstand future attacks by reducing the number of applications that are available to exploitation. (For more information, go to Manual Security Rating Filters.)
     
  • Isolate applications to protect against file system and registry corruption or misuse. You can achieve this goal by integrating with Altiris® Software Virtualization SolutionTM software. (For more information, go to Run an Application in a Workspace Virtualization Layer.)
      

 

Info
titleNEW!

What's new in ACS 8.1

  • Support for reputation providers (such as VirusTotal)
  • Ready configuration of Microsoft's Enhanced Mitigation Experience Toolkit to detect and block software exploits (for details, go to Enhanced Mitigation (EMET) action)
  • Application Sandboxing, which limits the environments where certain code can execute (for details, go to Sandbox Action)
  • Over the shoulder requests or Group Member Authenticated messages which require the approval of a user in a specific group before the message action can continue
  • Apply Application Firewall policies on classified applications and enforce specific firewall behavior.

 

Additional Application Control features:

Getting Started Scenarios

...