Endpoint Network Access Control
FortiClient Endpoint Security Version 4.0 MR1 Administration Guide
04-40001-99556-20090626
http://docs.fortinet.com/
•
Feedback
9 For all other applications that are not specified in the list, select if you want to Allow,
Deny, or Monitor.
10 Click OK.
Table 2: Application groups and category definitions.
Category
Description
Security
Anti-Malware
Software that detects, filters, and eliminates malicious content.
Software
Authentication
Software that restricts access to and use of the computer and its
and
contents to authorized users and authorized uses.
Authorization
Encryption, PKI
Software that enables the encryption and decryption of data for security
purposes.
Firewalls
Software that protects the desktop from unauthorized remote access.
Hacking
Software used to attack or evade access controls and privacy
measures on other computers.
Potentially
Technologies that alter the operation of the user's hardware, software,
Unwanted
or network in ways that diminish control over the user experience,
Software
privacy, or the collection and distribution of personal information.
Proxy
Applications that enable or facilitate the avoidance or bypassing of
Avoidance
proxy server features.
Remote Access Software that enables authorized access to and use of a desktop
computer or private network from a remote location.
System Audit
Software used to monitor and log activity on a computer network,
including both legitimate use and attempts to access or use network
assets in unauthorized fashion, and to assess the status and security of
the network.
Multimedia
Media Players
Software that enables the creation and playback of audio or video files.
Communication
Groupware
Software that enables the sharing of files and applications across work
groups, networks, or enterprises and provides communication and
shared workspace for groups.
Internet
Software that interprets content and presents it on the desktop screen;
Browsers
excludes browsers dedicated to a single or limited sources.
Email
Software that enables the receiving, display, composing, and sending of
email from the desktop. Includes the client side of network applications
(e.g. Microsoft Outlook) and bulk email software, but not email
applications built into web browsers.
Instant
Software that enables the sending and receiving of synchronous, real-
Messaging
time messages on the desktop. (Also known as chat-room software.)
P2P File
Software that enables file search and sharing across a network without
Sharing
dependence on a central server.
Telephony,
Software that enables telephonic transmission of voice and other data,
Conferencing,
including software for BBS, IP telephony, and dial-up internet access.
Fax
Critical Functions
Never Block
Executables needed to enable the desktop machine to perform its basic
functions prior to the use of added applications.
Entertainment
Adult
Software that includes depictions of nudity or sexual activity or other
elements that might be objectionable to non-consenting users.
Enabling Endpoint Control
35
Need help?
Do you have a question about the Version 4.0 MR1 and is the answer not in the manual?