20.08.2013 Views

Application Control - Kaspersky Lab

Application Control - Kaspersky Lab

Application Control - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Kaspersky</strong> Small Office Security 2<br />

Table of content<br />

Table of content ............................................................................................................................... 1<br />

<strong>Application</strong> control ........................................................................................................................ 2<br />

What is <strong>Application</strong> <strong>Control</strong> ....................................................................................................... 2<br />

Enabling/Disabling <strong>Application</strong> <strong>Control</strong> ...................................................................................... 2<br />

Placing applications into groups ................................................................................................ 3<br />

Viewing activity of applications .................................................................................................. 7<br />

Modifying a trust group for an application .................................................................................. 8<br />

<strong>Application</strong> control rules .......................................................................................................... 10<br />

Changing the group rule ....................................................................................................... 10<br />

Editing application rules ....................................................................................................... 13<br />

Creating a network rule for an application (Firewall) ............................................................ 15<br />

Editing storage time for rules................................................................................................ 17<br />

Setting of restrictions of parental process ............................................................................ 19<br />

Configuring exclusions ......................................................................................................... 21<br />

Protecting personal data .......................................................................................................... 23<br />

1 | 28

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!