Configuring Application Control - F-SECURE CLIENT SECURITY 7.00 Administrator's Manual

Hide thumbs Also See for CLIENT SECURITY 7.00:
Table of Contents

Advertisement

6.5

Configuring Application Control

1. Select the subdomain for which you created the rule in the Policy
Domains tab.
2. Go to the Summary tab, and check if any new security alerts are
displayed for the domain.
3. To see the alert details, click
to the Alerts tab that displays a detailed list of Security Alerts.
Application Control allows for safe browsing and is an excellent defence
against malicious computer programs. Application Control is also an
excellent tool for fighting trojans (for a definition of a Trojan horse and
other terms, see the "Glossary", 297) and other network malware as it
does not allow them to send any information to the network.
Application Control rules can be used to define more specific restrictions
to network traffic, on top of the restrictions defined in firewall rules. The
application permissions cannot be used to allow traffic that has been
denied by static firewall rules. However, if you have allowed some
network traffic in the static rules, you can use Application Control to
decide whether an application can be allowed to take advantage of the
rules or not. In other words, you can create a rule that allows traffic and
limit the use of that rule with Application Control.
When Application Control is centrally managed, the administrator can
decide which programs that access the network can be used in the
workstations. In this way it is possible to prevent the use of programs that
are against the company security policy, and to monitor which programs
the end users really are using.
The basic idea when configuring application control is to allow the
necessary applications and deny the rest.
CHAPTER 6
View alerts by
severity.... This takes you
209

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CLIENT SECURITY 7.00 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Client security

Table of Contents