Application Control - Kaspersky Lab
Application Control - Kaspersky Lab
Application Control - Kaspersky Lab
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Kaspersky</strong> Small Office Security 2<br />
Table of content<br />
Table of content ............................................................................................................................... 1<br />
<strong>Application</strong> control ........................................................................................................................ 2<br />
What is <strong>Application</strong> <strong>Control</strong> ....................................................................................................... 2<br />
Enabling/Disabling <strong>Application</strong> <strong>Control</strong> ...................................................................................... 2<br />
Placing applications into groups ................................................................................................ 3<br />
Viewing activity of applications .................................................................................................. 7<br />
Modifying a trust group for an application .................................................................................. 8<br />
<strong>Application</strong> control rules .......................................................................................................... 10<br />
Changing the group rule ....................................................................................................... 10<br />
Editing application rules ....................................................................................................... 13<br />
Creating a network rule for an application (Firewall) ............................................................ 15<br />
Editing storage time for rules................................................................................................ 17<br />
Setting of restrictions of parental process ............................................................................ 19<br />
Configuring exclusions ......................................................................................................... 21<br />
Protecting personal data .......................................................................................................... 23<br />
1 | 28