Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 29 Next »

Introduction

Application-level security attack, such as file system corruption, registry corruption, spyware, and keylogging, pose a serious threat to mission critical business operations. Arellia Application Control Solution™ software helps you manage this risk by allowing you to control the software applications in your Altiris environment.

With Application Control Solution you can

Note

The principle of least privilege requires that each subject in a system is granted the most restrictive set of privileges (or lowest clearance) that is needed for the performance of authorized tasks. The application of this principle limits the damage that can result from accident, error, or unauthorized use.

  • Apply security ratings to withstand future attacks by reducing the number of applications that are available to exploitation. See Manual Security Rating.
  • Isolate an application to protect against file system and registry corruption or misuse. You can achieve this goal by integrating with Altiris® Software Virtualization SolutionTM software. See Run an Application in an SWV Layer.
  • Protect against data theft. You can automate the encryption of documents because Application Control Solution has seamless integration with Windows Encrypted File System. For information, search Microsoft for EFS Encryption. Using Application Control Solution, you can automatically encrypt documents on a notebook and prevent theft. See Automate Document Encryption.
  • Control an application's ability to read or write to specific network locations. See Prevent Read and Write to File Types or Network Locations.
  • Prevent potentially malicious applications, such as keyloggers, from installing Windows API hooks. See Prevent Malicious Applications from Running.
  • Protect against viruses and spyware. See Quarantine Files.
Getting Started Scenarios

For sample scenarios that highlight the functionality and use of this solution, see Getting Started and Standard Use Cases.

  • No labels