Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Sample Scenarios

This section describes some useful tasks you can create with Application Control
Solution.

Task

...

prerequisites

Ensure the following Application Control policies are enabled:

...

  • The Default File Inventory Policy with its default configuration. See File
    Inventory Agent Configuration (page 41).

Scenarios

Whitelisting Reference Systems

In this scenario you will create a reference system whitelist policy that targets a collection of computers, searches for Windows executables, then adds any Windows executables not currently in a security catalog to a whitelist. You will also add applications already included in a security catalog to the whitelist.

To create a reference system whitelist policy

1. In the Altiris Console, click the Tasks tab.

2. In the left pane, right-click Tasks > Security Management > Application Control > Windows > Application Control Tasks > Application Control Policies.

3. Select New > Reference System Whitelist.

4. In the right pane, configure the fields as follows:

? Check Enable.

? Computers - Leave the default setting, All Windows Computers with
Application Control Agent Installed.

? Reference System Options, Computers - In the dialog, select the computer collection you wish to target with the policy.

? File Specification(s) - In the dialog, select Executables in Windows
Directories.

? Reporting Filter - In the dialog, select Executables in Windows Directories not present in Security Catalogs.

? Applications to Control, Application - In the dialog, select Present in Signed
Security Catalog.

5. Click Apply.

Altiris Application Control Solution Help 49

Restrict an Application's Process Rights

This scenario describes the process involved in restricting an application's process rights. This sample scenario guides you through the necessary steps, using the default Limit Internet Explorer and Outlook process rights policy.

Scenario Description

In this scenario, the end user has:

? Internet Explorer installed

? A user account with administrative rights

? Network Messenger Service enabled and running

With this configuration, Internet Explorer has inherited administrative rights from the user and is therefore able to stop Windows Services.

Scenario Resolution

To prevent Internet Explorer from stopping Windows services, perform the following steps:

1. In the Altiris Console, select the Tasks tab.

2. In the left pane, select Tasks > Security Management > Application Control > Windows > Application Control Tasks > Application Control Policies > Limit Internet Explorer and Outlook process rights.

3. In the right pane, select Enable.

4. Open Internet Explorer, select File > Open and browse to cmd.exe in the SYSTEM
directory.

5. Attempt to stop the MSN Messenger service using the command line: NET STOP Messenger.

An Application Control message appears on the taskbar stating "IEXPLORER.EXE has had its rights reduced" and you are unable to stop the service.

Automate Document Encryption

This section describes the process involved in automatic document encryption. For this scenario you will create a policy to enforce document encryption for all Microsoft Excel Spreadsheets.

Scenario Description

In this scenario, the end user has:

? Two user accounts

? Microsoft Excel

Scenario Resolution

To automatically encrypt Microsoft Excel spreadsheets, perform the following steps:

1. In the Altiris Console, select the Tasks tab.

Altiris Application Control Solution Help 50

2. In the left pane, select Tasks > Security Management > Application Control >
Windows > Application Control Tasks > Manage Applications.

3. In the right pane, click ? and select Automate Document Encryption Policy.

4. In Step 1 of the Application Control Wizard, click Next.

5. In Step 2, click the Include: link and in the Items Selector dialog, select MS Excel. Click Next.

6. In Step 3, Policy Details, configure as follows:

a. Select Enable.

b. In the Name field, enter Encrypt Microsoft Excel Spreadsheets.

c. In the Description field, enter "This policy will automate the encryption of all spreadsheets created or modified by Microsoft Excel."

d. Click Finish.

7. Open Microsoft Excel, create a new spreadsheet, save it, and close the application.

8. Open Windows Explorer and browse to the new file. The filename will appear green.
Checking the Advanced Attributes on the file properties shows that the file is encrypted.

9. To verify that the encryption is working, log on using a different user account and attempt to open the file.

Prevent Malicious Applications from Running

This scenario shows you how to prevent the end user from running cmd.exe.

Scenario Description

In this scenario:

? The end user has run C:\windows\system32\cmd.exe at least once since the
Application Control Agent was installed.

? File Inventory Agent has returned file inventory to the Notification Server.

Scenario Resolution

To automatically encrypt Microsoft Excel spreadsheets, perform the following steps:

1. In the Altiris Console, select the Tasks tab.

2. In the left pane, select Tasks > Security Management > Application Control >
Windows > Application Control Tasks > Manage Applications.

3. In the right pane, enter "cmd" in the Win32 Executable field and click Refresh.

4. Select all rows of the grid and click the Blacklist button.

5. Run Collection Delta Update Schedule. For instructions, see Notification Server Help.

6. Enable the Deny Blacklist execution policy. See Manage Applications (page 28).

7. On a managed computer, start cmd.exe. The cmd.exe will not start and you receive a system tray message.

Altiris Application Control Solution Help 51

Prevent Read/Write to File Types or Network
Locations

Scenario Description

In this scenario, the end user has the following installed:

? Microsoft Word

? Microsoft Excel

Scenario Resolution

1. On the managed computer, create a Microsoft Word document and save it to c:\company invoices\invoice 101.doc.

2. In the Altiris Console, select the Tasks tab.

3. In the left pane, select Tasks > Security Management > Application Control >
Windows > Application Control Tasks > Application Control Policies.

4. In the left pane, right-click Application Control Policies and select New >
Application Control Policy.

5. Configure the policy as follows:

? Name - "Write-protect Word documents in the Company Invoices directory"

? Description - Prevent Microsoft Word from having write access to, or creating new Word documents in the company invoices directory

? Applies To: - All Computers with Application Control Agent Installed

? Send Application Action Event - Enabled

? Continue enforcing lower priority policies after enforcing this policy - Enabled

6. Click the Include Filters link, select MS Word in the Items Selector dialog, and click Apply.

7. Under Application Actions, click the Actions link.

8. In the Items Selector dialog, click ? , and select Deny File Access Application
Action.

9. In the Deny File Access dialog, enter the following in the appropriate fields:

? Name - Prevent write access of Word documents to Company Invoice directory

? Path - C:\company invoices

? Mime type - Word document

10. Click Apply and close the dialog.

11. In the Items Selector dialog, click ?, select the new Deny File Access
Application Action, and click Apply.

12. Enable the policy and click Apply.

13. In Microsoft Word, open C:\company invoices\invoice 101.doc. The file is read only and can't be modified.

Altiris Application Control Solution Help 52

Other Scenario Tests

1. Create a new document and attempt to save it to c:\company invoices\. You will be unable to open it and will receive a File Permission error.

2. Verify that a Word document can be created or modified in a different directory.

3. In Microsoft Excel, save a spreadsheet to the same location as Step 1. The permissions are limited to Microsoft Word.

Run an Application in an SVS Layer

This scenario shows you how to capture application data in a Software Virtualization
Solution layer.

Scenario Description

In this scenario, the end user has the following installed:

? Microsoft Word

Scenario Resolution

1. On the managed computer, create the Microsoft Word document
C:\document\important document.doc.

2. In the Altiris Console, select the Tasks tab.

3. In the left pane, select Tasks > Security Management > Application Control >
Windows > Application Control Tasks > Manage Applications.

4. In the right pane, click ? and select Run an application in an SVS layer.

5. In Step 1 of the Application Control Wizard, click Next.

6. In Step 2, select MS Word as the Include Filter.

7. In Step 3, configure the policy details as follows, and click Finish:

? Select Enable.

? Name - Run Microsoft Word in an SVS layer.

? Description - Capture Microsoft Word data in an SVS layer.

8. In Microsoft Word, create a document and save it to C:\document\suspect document.doc.

9. Close Microsoft Word.

10. Verify the document is not visible in Windows Explorer; it has been isolated by the layer.

11. Disable the policy and attempt to open the document. The document will no longer exist as the layer is no longer active for Microsoft Word.

Quarantine Files

This scenario shows you how to quarantine a known malicious application.

Altiris Application Control Solution Help 53

Scenario Description

Copy and rename cmd.exe: "C:\Virus\malicious application.exe".

Scenario Resolution

1. On the managed computer, create the Microsoft Word document
C:\document\important document.doc.

2. In the Altiris Console, select the Tasks tab.

3. In the left pane, select Tasks > Security Management > Application Control >
Windows > Application Control Tasks > Manage Applications.

4. In the right pane, click ? and select Quarantine an application policy.

5. In Step 1 of the Application Control Wizard, click Next.

6. In Step 2, click the Include link.

7. In the Items Selector dialog, click ? , and select Dynamically Evaluated Filters
> Win32 Executable File Filter.

8. In the Win32 Executable File Filter dialog, enter the following in the appropriate fields:

? Name - Quarantine Malicious Applications

? File Name - Malicious application.exe

9. Click Apply and close the dialog.

10. In the Items Selector dialog, click ?, select the newWin32 Executable File
Filter, and click Apply.

11. In Step 3, Enable the policy, configure the policy as follows, and click Apply:

? Name - Quarantine Malicious Applications.

? Description - This is a sample policy for demonstrating the quarantine capabilities of Application Control Solution.

12. Run malicious application.exe on the managed computer.

13. A message appears and the file is moved to C:\quarantined files.

Child pages (Children Display)