The following instructions assume that you are on the Section 9.0, Creating Security Policies) or that you are on the page for an existing Application Control policy (see Section 13.0, Editing a Policy’s Details).
page in the Create New Application Control Policy Wizard (seeThe Application Control policy lets you control file execution and Internet access for applications. Control extends beyond standard executable files (.exe) to include other file types such as .bat, .txt, .pdf, .mpg, and so forth.
Watch a video that demonstrates how to create an Application Control policy. |
Configuration is done through application controls. An application control identifies one or more applications and assigns a behavior to the applications. The supported behaviors are: 1) block file execution, 2) block Internet access, and 3) no restrictions (allow execution and Internet access). The behavior controls all instances of the listed applications, regardless of location (fixed disk, removable storage device, CD/DVD, or network drive).
For example, assume that App1.exe, App2.exe, and App3.exe are instant message applications that you don’t want users to run. You could create an application control called Messaging Applications, assign the three applications to the control, and set the behavior to block execution of the applications.
Or, assume that App4.exe and App5.exe are media applications that access music and video from the Internet. You don’t want bandwidth consumed by these types of activities, so you create an application control called Internet Media Applications, assign the two applications to the control, and set the behavior to block Internet access.
Before applying any policy that blocks file execution or Internet access for an application, you should test the policy on a single workstation to ensure that no adverse or unexpected results occur. For example, blocking critical operating system applications can result in a non-functioning operating system. Or, blocking a Microsoft Office application results in repeated attempts to reinstall the application, which could affect system operation or performance.
The following table provides instructions for managing the policy’s application controls:
Task |
Steps |
Additional Details |
---|---|---|
Create a new application control |
|
The following applications cannot be blocked:
|
Copy an existing application control list from another policy |
|
All application controls included in the selected policies are copied. If necessary, you can edit the copied controls after they are added to the list. |
Import an application control from a policy export file |
|
All application controls included in the export file are imported. If necessary, you can edit the imported controls after they are added to the list. For information about exporting controls, see Export an application control. |
Edit an application control |
|
|
Rename an application control |
|
|
Export an application control |
|
|
Delete an application control |
|
|
The enforcement behavior determines when enforcement occurs for applications that are already running when the policy is applied. Choose from the following options:
Ignore: Do not enforce the application control behavior. For example, if the application is not allowed to execute (
setting), allow the application to continue to run. Or, if the application is not allowed to access the Internet ( setting), allow the application to continue to access the Internet.Enforce immediately: Enforce the application control behavior immediately. For example, if the application is not allowed to execute (
setting), terminate the application immediately.With immediate enforcement, the user does not receive any warning. If you want the user to know why the application was terminated, you can use the Display message when enforcing behavior option.
Enforce after XX minutes: Enforce the application control behavior after the specified number of minutes. For example, is you set this option to 5 minutes (the default) and the application is not allowed to execute ( setting), terminate the application after 5 minutes.
If the application is running when the policy is applied, a Policy Violations dialog box is displayed to inform the user that the application will be terminated after the specified number of minutes. The dialog box includes the application executable name and a countdown of the time remaining until the application is terminated. If multiple applications violate the policy, all applications are listed.
Allow the user to delay enforcement for an additional XX minutes: Select this option if you want to allow the user to delay the enforcement beyond the time specified by the
option. The additional time is applied only if the user clicks the button in the Policy Violations dialog box.For example, assume that you set the
option to 5 minutes and this option to 10 minutes. At any time before the first 5 minutes expires, the user can click the button to delay the enforcement for an additional 10 minutes.Display message when enforcing behavior: You can also display a message when enforcing the application control behavior. For example, if you select the
option, you can display a message informing the user why the application was terminated.To use a display message, select the
option, then fill in the following fields:Title of Message Window: Specify the Message Window’s title. For example, “Application Shutdown Alert.”
Body: Provide the text for the message body.
Message Hyperlink: If you want to include a hyperlink in the message, select
, then fill in the following:Display Text: The text to display as the hyperlink in the message.
Link: The command or Web URL to be executed when the display text is clicked. Any link that starts with http, https, or www is treated as a Web URL and launches a Web browser. Any other link is treated as an executable command. For example, you might include www.acme.com/appusage to a open a Web page that provides your corporate policy on authorized application usage.
Parameters: Applies only to executable commands, not to Web URLs. Specify any parameters that you want appended to the executable command. A space is automatically added between the executable command and the first parameter.