20.08.2013 Views

Application Control - Kaspersky Lab

Application Control - Kaspersky Lab

Application Control - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Kaspersky</strong> Small Office Security 2<br />

6. In the lower part of the Settings window click the Apply button.<br />

Placing applications into groups<br />

At the first startup of an application on the computer, the <strong>Application</strong> <strong>Control</strong> component verifies<br />

its safety and searches the internal database of known applications for a matching entry, and then<br />

sends a request to the <strong>Kaspersky</strong> Security Network 1 database or having a digital signature 2<br />

.<br />

After search <strong>Application</strong> <strong>Control</strong> places the application into one of the following trusted groups:<br />

► Trusted. Trusted applications are applications with digital signatures of trusted vendors and<br />

applications signatures of those are included to the trusted applications database.<br />

<strong>Application</strong>s of that group are allowed to perform any network activity. Activities of such<br />

applications are monitored by Proactive Defense and File Anti-Virus.<br />

► Low Restricted. Low restricted applications are applications which are without digital<br />

signatures of trusted vendors and which are not included to the trusted applications<br />

database. Nevertheless, the low risk rating 3<br />

. is assigned to such applications. <strong>Application</strong>s<br />

of that group are allowed to perform some operations, to manage the system, hidden<br />

access to the network. Most operations require user authorization.<br />

► High Restricted. High restricted applications are applications without digital signatures and<br />

which are not included to the trusted applications database. The high risk rating is assigned<br />

to such applications. <strong>Application</strong>s of this group require user authorization for most activities<br />

in the system; some actions, however, are restricted for these applications.<br />

1 <strong>Kaspersky</strong> Security Network is a system which allows to get information about files opened by the user on the<br />

computer and thus tracks malicious objects and their spreading channels.<br />

2 Digital signature is an electronic security mark which carries the information about the software vendor and shows if<br />

the software was changed after the signing (i.e. after release). If software is signed by its vendor and the signature<br />

authenticity is verified by the certificate center, then you can be sure that the software is authentic and was not.<br />

16 Risk rating is an indicator of the application danger for the system. The risk rating is calculated based on definite<br />

criteria.<br />

3 | 28

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!