The following instructions assume that you are on the Configure Application Control Settings page in the Create New Application Control Policy Wizard (see Creating Security Policies) or that you are on the Details page for an existing Application Control policy (see Editing a Policy’s Details).
The Application Control policy lets you control file execution and Internet access for applications. Control extends beyond standard executable files (.exe) to include other file types such as .bat, .txt, .pdf, .mpg, and so forth.
Configuration is done through application controls. An application control identifies one or more applications and assigns a behavior to the applications. The supported behaviors are: 1) block file execution, 2) block Internet access, and 3) no restrictions (allow execution and Internet access). The behavior controls all instances of the listed applications, regardless of location (fixed disk, removable storage device, CD/DVD, or network drive).
For example, assume that App1.exe, App2.exe, and App3.exe are instant message applications that you don’t want users to run. You could create an application control called Messaging Applications, assign the three applications to the control, and set the behavior to block execution of the applications.
Or, assume that App4.exe and App5.exe are media applications that access music and video from the Internet. You don’t want bandwidth consumed by these types of activities, so you create an application control called Internet Media Applications, assign the two applications to the control, and set the behavior to block Internet access.
NOTE:Application controls are not enforced on files in the %WINDIR% and %ZENSERVER_HOME% directories.
Wildcard usage: The wildcard option provides the capability to implement a control on multiple applications or files with a single entry in the Application Control List or to implement a control on a single application or file without providing the full file name. The asterisk * is the only wildcard option supported in the Application Control policy. A few examples of using the asterisk wildcard for application or file names are provided below. In these examples, the Application Control List is configured for No Execution.
CAUTION:Careful consideration should be used when implementing the wildcard for applications in a way that could impede critical system files and processes from running. For example, using the “No Execution” control with a *.exe wildcard or wildcards with dll, bin, or lib file extensions could put a device in non-functional state.
Wildcard Example |
Enforced Policy Outcome |
---|---|
*.bat |
Blocks execution and opening of all files according to the configured enforcement behavior that have .bat as the file extension. |
*setup*.exe |
Blocks execution and opening of programs and files according to the configured enforcement behavior that have setup as part or all of the file name when using the .exe file extension. |
notepad.* |
Blocks execution of the Notepad program or any files named notepad regardless of the file extension, according to the configured enforcement behavior. |
iexplore.* |
Blocks execution of the Internet Explorer program or any files named iexplore regardless of the file extension, according to the configured enforcement behavior. |
*calc* |
Blocks execution and opening of programs and files with calc in the file name according to the configured enforcement behavior. |
Before applying any policy that blocks file execution or Internet access for an application, you should test the policy on a single workstation or server to ensure that no adverse or unexpected results occur. For example, blocking a Microsoft Office application could result in repeated attempts to reinstall the application, which could affect system operation or performance.
The following table provides instructions for managing the policy’s application controls:
Task |
Steps |
Additional Details |
---|---|---|
Create a new application control |
|
The following applications cannot be blocked:
|
Copy an existing application control list from another policy |
|
All application controls included in the selected policies are copied. If necessary, you can edit the copied controls after they are added to the list. |
Import an application control from a policy export file |
|
All application controls included in the export file are imported. If necessary, you can edit the imported controls after they are added to the list. For information about exporting controls, see Export an application control. |
Edit an application control |
|
|
Rename an application control |
|
|
Export an application control |
|
|
Delete an application control |
|
|
The enforcement behavior determines when enforcement occurs for applications that are already running when the policy is applied. Choose from the following options:
Ignore: Do not enforce the application control behavior. For example, if the application is not allowed to execute (No Execution setting), allow the application to continue to run. Or, if the application is not allowed to access the Internet (No Internet Access setting), allow the application to continue to access the Internet.
Enforce immediately: Enforce the application control behavior immediately. For example, if the application is not allowed to execute (No Execution setting), terminate the application immediately.
With immediate enforcement, the user does not receive any warning. If you want the user to know why the application was terminated, you can use the Display message when enforcing behavior option.
Enforce after XX minutes: Enforce the application control behavior after the specified number of minutes. For example, is you set this option to 5 minutes (the default) and the application is not allowed to execute (No Execution setting), terminate the application after 5 minutes.
If the application is running when the policy is applied, a Policy Violations dialog box is displayed to inform the user that the application will be terminated after the specified number of minutes. The dialog box includes the application executable name and a countdown of the time remaining until the application is terminated. If multiple applications violate the policy, all applications are listed.
Allow the user to delay enforcement for an additional XX minutes: Select this option if you want to allow the user to delay the enforcement beyond the time specified by the Enforce after XX minutes option. The additional time is applied only if the user clicks the Delay All button in the Policy Violations dialog box.
For example, assume that you set the Enforce after XX minutes option to 5 minutes and this option to 10 minutes. At any time before the first 5 minutes expires, the user can click the Delay All button to delay the enforcement for an additional 10 minutes.
Display message when enforcing behavior: You can also display a message when enforcing the application control behavior. For example, if you select the Enforce immediately option, you can display a message informing the user why the application was terminated.
To use a display message, select the Display message when enforcing behavior option, then fill in the following fields:
Title of Message Window: Specify the Message Window’s title. For example, “Application Shutdown Alert.”
Body: Provide the text for the message body.
Message Hyperlink: If you want to include a hyperlink in the message, select Include message hyperlink, then fill in the following:
Display Text: The text to display as the hyperlink in the message.
Link: The Web URL to be executed when the display text is clicked. Any link that starts with http, https, or www is treated as a Web URL and launches a Web browser.
For example, when linking to a URL, you might include www.acme.com/appusage to a open a Web page that provides your corporate policy on authorized application usage.