Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Space Index

0-9 ... 0 A ... 8 B ... 0 C ... 5 D ... 1 E ... 0
F ... 3 G ... 1 H ... 1 I ... 5 J ... 0 K ... 0
L ... 0 M ... 1 N ... 0 O ... 1 P ... 2 Q ... 2
R ... 7 S ... 2 T ... 3 U ... 1 V ... 0 W ... 3
X ... 0 Y ... 0 Z ... 0 !@#$ ... 0    

0-9

A

Page: Application actions
The Application Actions folder contains all the operations that can be processed before a certain application can be run on a managed computer. Each action can be referenced by an Application Control policy and determines the environment in which the appl
Page: Application Control Agent configuration
This policy lets you configure general parameters than control the behavior of the Application Control Agent. To access this page In the Altiris Console, select the Configuration tab. In the left pane, select Configuration > Solution Settings > Security M
Page: Application Control Agent Package Page
This page lets you create a package used by Application Control Agent installation policies as needed when performing an agent rollout or uninstallation. Generally, we recommend not changing any settings to this package. Package tab Configure a package us
Page: Application Control Agent upgrade page
This is a generic policy that can be used for several things, including agent rollout and uninstallation, and solution agent rollout, upgrade, and uninstallation. Item Description Enable Select to enable the policy. Name Name of the policy. Description De
Page: Application Control policies
Application Control policies determine whether or not application actions are run before an end user can run an application. Be default, there are four security policies. Click any of the following to open the Application Control Policy page: Package Cont
Page: Application Filters
An application filter defines the applications (groups of files) that can be restricted by an Application Control Policy. There are three types: Application Context Filters - These filters are evaluated by the Altiris Agent and are used to apply security
Page: Application initiation policy
An Application Initiation policy allows for the processing of security context actions before an application has been launched. This allows for the bypass of Windows Vista UAC prompts. An Application Initiation policy is similar to an Application Control
Page: Automate document encryption
This section describes the process involved in automatic document encryption. For this scenario you will create a policy to enforce document encryption for all Microsoft Excel Spreadsheets. Scenario description In this scenario, the end user has: Two user

B

C

Page: Configuration Tab
Configuration Tab See Application Control Agent configuration (page 32) Application Control Agent Installation (page 33) Application Control Agent Package Page (page 33) Application Control Agent upgrade page (page 39) Application Control Agent Uninstall
Page: Create and edit application filters
Create an application filter To create an application filter, do the following steps: In the Altiris Console, click the Tasks tab. In the left pane, select Tasks > Security Management > Windows > Application Control Tasks > Application Filter. Choose the
Page: Creating an Application Control Policy
Application Control policies determine whether or not certain actions are run before an end user can run an application. Example: A policy may deny application execution or quarantine the application when a user attempts to run the application. The easies
Page: Creating application actions
To create application actions, do the following steps: In the Altiris Console, click the Tasks tab. In the left pane, select Tasks > Security Management > Windows > Application Control Tasks > Application Actions. Choose the action you want to create. For
Page: Creating Policies
Creating Policies This section shows you how to create policies without using the Application Control Wizard. We recommend using the Application Control Wizard to create policies and to associate actions, filters, and target computers. See Application Con

D

Page: Default resource discovery agent policy
This policy controls how often the File Inventory Agent (see Installing the File Inventory Agent on page 8) inventories managed computers and reports back to the Notification Server. To access the Default Resource Discovery Agent Policy In the Altiris Con

E

F

Page: File inventory agent configuration
The File Inventory Policy discovers information about software programs running on managed computers. To manually run the File Inventory Policy on a managed computer at any time, perform the following steps: Enable Power Management on the Altiris Agent. F
Page: File inventory filters
A file inventory filter defines the applications (groups of files) that can be restricted by a file control policy, and the applications (groups of files) that can be restricted by an Application Control Policy. There are five types: Executable Headers -
Page: File Scanning Policies
File scanning policies scan managed computers for application file types (Example: ITunes files within Windows directories) and reports back to the Notification Server. To create a file scanning policy In the Altiris Console, click the Tasks tab. In the l

G

Page: Getting Started
Getting started The Getting Started tasks guide you through the basic setup, configuration, and use of Application Control Solution. There are two methods for performing most tasks: the Quick Start page and the Altiris Console. The Altiris Console is the

H

Home page: Home
Application Control Solution 6.1 product documentation This is the product documentation for Application Control Solution (ACS) v6.1. To find your way around, please use the left panel to browse the document tree, or use the search bar. Or start at the be

I

Page: Index
{index}{index}
Page: Installation
This chapter details installation requirements and procedures. Prerequisites The following must be installed before installing Application Control Solution on the Notification Server computer: Altiris® Notification Server™ 6.0 SP3 (or later). For informat
Page: Installing the Application Control Agent
The Application Control Agent is software you can install on your managed computers, allowing Application Control Solution to run policies, manage applications, and run defined actions on managed computers. The agent also includes the File Inventory Agent
Page: Installing the File Inventory Agent
The File Inventory Agent is software that you install on your managed computers, allowing the Application Control Solution to obtain a list of files discovered on the computers. The list of files is sent to the Notification Server through an inventory Not
Page: Introduction
Application-level security attack, such as file system corruption, registry corruption, spyware, and keylogging, pose a serious threat to mission critical business operations. Arellia Application Control Solution™ software helps you manage this risk by al

J

K

L

M

Page: Manage applications
A feature of this solution is that most tasks, policies, and filtering can be done through the Manage Applications page. To access this page: In the Altiris Console, click the Tasks tab. In the left pane, select Tasks > Security Management > Application C

N

O

Page: Overview
After installation, the Application Control Solution lifecycle is represented by the following graphic: life cycle.jpg Understanding file discovery After installing Application Control Solution you must install the File Inventory Agent on managed computer

P

Page: Prevent malicious applications from running
This scenario shows you how to prevent the end user from running cmd.exe. Scenario description In this scenario: The end user has run C:\windows\system32\cmd.exe at least once since the Application Control Agent was installed. File Inventory Agent has ret
Page: Prevent read and write to file types or network locations
Scenario description In this scenario, the end user has the following installed: Microsoft Word Microsoft Excel Scenario resolution On the managed computer, create a Microsoft Word document and save it to c:\company invoices\invoice 101.doc. In the Altiri

Q

Page: Quarantine files
This scenario shows you how to quarantine a known malicious application. Scenario description Copy and rename cmd.exe: "C:\Virus\malicious application.exe". Scenario resolution On the managed computer, create the Microsoft Word document C:\document\import
Page: Quick starts
This page accesses commonly used Application Control Solution configurations, tasks, policies, and reports. To access this page In the Altiris Console, click the Tasks tab. In the left pane, select Tasks > Quick Starts. In the right pane, select Applicati

R

Page: Reports tab
This section details the folders and items that Application Control Solution installs on the Reports tab. You can use or edit default reports, or create your own to help you analyze application control information. Reports are created for Application Cont
Page: Resource discovery update
The Resource Discovery Update page lets you configure the schedule for calculating what Notification Server Resources need additional client or server side discovery. The task enumerates all server and client side Resource Discoverers and either: - For Se
Page: Resource purging
The resource Purging policy lets you perform a periodic database cleanup and remove any file and digital certificate resources that are no longer associated with any computers. By default, the schedule runs daily. To access and enable this policy In the A
Page: Resources tab
Folders and items in the Resources tab can be found by selecting Resource Management > Resources > Software Management > File Inventory in the left pane. You can double-click on any resource in the resource folders to launch the Resource Manager console.
Page: Restrict an application's process rights
This scenario describes the process involved in restricting an application's process rights. This sample scenario guides you through the necessary steps, using the default Limit Internet Explorer and Outlook process rights policy. Scenario description In
Page: Reviewing Application Inventory
After the Application Control Agent has been installed, the solution performs an application inventory. This inventory is gathered by the File Inventory Policies---Default File Inventory Policy and Default File Discovery Policy. To plan your application c
Page: Run an Application in an SVS Layer
This scenario shows you how to capture application data in a Software Virtualization Solution layer. Scenario description In this scenario, the end user has the following installed: Microsoft Word Scenario resolution On the managed computer, create the Mi

S

Page: Sample scenarios
This section describes some useful tasks you can create with Application Control Solution. Task prerequisites Ensure the following Application Control policies are enabled: Application Control Agent Configuration Policy - Set Send Application Action Event
Page: Security rating
Application Control Solution lets you rate all discovered applications. You can add them to Blacklist, Whitelist, or Graylist collections, which can be used for filtering when creating policies. To rate an application's security In the Altiris Console, cl

T

Page: Tasks tab
The following folders and items are used to manage applications: Application actions Application filters Manage applications
Page: Tracking Policies
To track all policies enforced by Application Control Solution, run the Application Actions by Computers report. To track policies In the Altiris Console, click the Reports tab. In the left pane, select Reports > Security Management > Application Control.
Page: TreeNavigation

U

Page: User Interface
When Application Control Solution is installed, folders and items are placed in various tabviews of the Altiris Console. You can use these folders and items to control applications throughout your organization. Folders and items for Application Control So

V

W

Page: Whitelisting reference systems
In this scenario you will create a reference system whitelist policy that targets a collection of computers, searches for Windows executables, then adds any Windows executables not currently in a security catalog to a whitelist. You will also add applicat
Page: Whitelisting software packages
This scenario takes you through the process of creating an application control policy to inventory Microsoft and Adobe applications and add them to a whitelist, marking them as safe to be used in your environment. Once the policy has been created, it will
Page: Working with Application Control Solution
Working with Application Control Solution This chapter covers the most common tasks when working with Application Control Solution. Configuring Application Control Solution For information on all configuration options for Application Control Solution, see

X

Y

Z

!@#$

  • No labels