F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 259

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

1. First you must calculate the to calculate the SHA-1 hash identifier for
the application. There are free SHA-1 calculators available on the
Internet. You can use for example, the Microsoft File Checksum
Integrity Verifier. This tool is available from:
http://support.microsoft.com/kb/841290
A SHA-1 hash uniquely identifies the sequence of instructions that
define a program. If a new version of the program is made
available, you must repeat this process as the new program will
have a different SHA-1 hash.
2. When you have the SHA-1 identifier hash, open the View menu and
select the Advanced Mode option. The Advanced Mode user
interface is opened.
3. Select Root in the Policy Domains pane.
4. Select the Policy tab in the Properties pane (the middle pane).
5. On the Policy tab, select:
F-Secure > F-Secure System Control > Settings > Applications
6. Click
Add
to add a new rule.
7. Double-click the new entry in the SHA-1 hash column and paste the
SHA-1 hash into the empty cell.
8. Double click the new entry in the Notes column and type a note. You
should use this note as a reminder which application the SHA-1 hash
identifies.
9. Double-click the new entry in the Trusted column:
Select Yes to allow all events for the application
Select No to deny all events for the application.
10. Double-click the new entry in the Enabled column. Select Yes to
enabled to the rule.
11. Click
to save the policy data.
12. Click
to distribute the policy.
The application rule cannot be over-ridden locally by the user.
CHAPTER 12
259

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents