Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Next »

Application Control Solution 6.1 Help

Application-level security attack, such as file system corruption, registry corruption, spyware, and keylogging, pose a serious threat to mission critical business operations. Altiris® Application Control SolutionTM software helps you manage this risk by allowing you control of software applications in your Altiris environment.

With Application Control Solution you can:

  • Create policies to automatically inventory software packages or systems and add authorized applications to a whitelist. See Whitelisting Software Packages and Whitelisting Reference Systems.
  • Implement the principle of least privilege in order to enhance protection of data and functionality from malicious behavior. See Restrict an Application's Process Rights.

    Note - The principle of Least Privilege requires that each subject in a system be granted the most restrictive set of privileges (or lowest clearance) needed for the performance of authorized tasks. The application of this principle limits the damage that can result from accident, error, or unauthorized use.

  • Apply security ratings to withstand future attacks by reducing attack surface. You can reduce the attack surface by reducing the number of applications available to exploitation. See Security Rating (page 46).
  • Isolate an application to protect against file system and registry corruption or misuse. This is done through integration with Altiris® Software Virtualization SolutionTM software. See Run an Application in an SVS Layer (page 53).
  • Protect against data theft. You can automate the encryption of documents as Application Control Solution has seamless integration with Windows Encrypted File System. For information, see http://www.microsoft.com/resources/documentation/ windows/xp/all/proddocs/en-us/encrypt_overview.mspx?mfr=true.
    Using Application Control Solution, you can automatically encrypt documents on a notebook, thus preventing theft. See Automate Document Encryption (page 50).
  • Control an application's ability to read or write to specific network locations. See Prevent Read/Write to File Types or Network Locations (page 52).
  • Prevent potentially malicious applications, such as keyloggers, from installing Windows API hooks. See Manage Applications (page 28).
  • Protect from viruses and spyware. See Quarantine Files (page 53).

Typical Scenarios

For sample scenarios that highlight the functionality and use of this solution, see Application Control Solution Sample Scenarios (page 48).

    Overview
   


  • No labels