Application-level security attacks, such as file system corruption, registry corruption, spyware, and keylogging pose a serious threat to mission critical business operations. Arellia Thycotic Application Control Solution™ (ACS) software helps you manage this risk by enabling you to control the software applications in your environment.
With ACS you You can perform do the following in ACS:
- Create policies to automatically inventory software packages or systems and add authorized applications to a whitelist.
- Create policies to whitelist trusted file owners or digital certificates.
Whitelisting, orangelisting, and blacklisting - control what applications are and are not allowed to be run on an endpoint, with the ability to orangelist applications that have not been classified.- Reference System, Software Delivery Package, File Owner or Digital Certificate whitelists can be used to speed up whitelist policy creation
- Elevate privileges for standard users .
- instead of end users seeing the UAC prompt, they can have installers, updaters and applications elevated automatically. - Implement the principle of least privilege, that is require is require each subject in a system is granted the most restrictive set of privileges necessary for them to perform their tasks, to limit to limit damage that can result from accident, error, or unauthorized use. (For details about how to protect your system from malicious behavior, go to Restrict an Applicationapplication's Process Rightsprocess rights.)
- Apply security ratings to withstand future attacks by reducing the number of applications that are available to exploitation. (For more information, go to Manual Security Rating Filters.)
- Isolate applications to protect against file system and registry corruption or misuse. You can achieve this goal by integrating with Altiris® Software Virtualization SolutionTM software. (For more information, go to Run an Application in a Workspace Virtualization Layer.)
Info | ||
---|---|---|
| ||
What's new in ACS 8.1
|
Additional Application Control features:
- Protect against data theft by automating the encryption of documents utilizing ACS's seamless integration with Windows Encrypted File System. (For more information, search Microsoft for EFS Encryption, or go to Automate Document Encryptiondocument encryption.)
- Control an application's ability to read or write to specific network locations. (For more information, go to Prevent Read and Write to File Types or Network Locations.)
- Prevent potentially malicious applications, such as keyloggers, from installing Windows API hooks. (For more information, go to Prevent Malicious Applications from Running.Restrict malicious applications)
- Protect against viruses and spyware. (For more information, go to Quarantine Files.)
Getting Started Scenarios
...