Application Control - Kaspersky Lab
Application Control - Kaspersky Lab
Application Control - Kaspersky Lab
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Kaspersky</strong> Small Office Security 2<br />
6. In the lower part of the Settings window click the Apply button.<br />
Placing applications into groups<br />
At the first startup of an application on the computer, the <strong>Application</strong> <strong>Control</strong> component verifies<br />
its safety and searches the internal database of known applications for a matching entry, and then<br />
sends a request to the <strong>Kaspersky</strong> Security Network 1 database or having a digital signature 2<br />
.<br />
After search <strong>Application</strong> <strong>Control</strong> places the application into one of the following trusted groups:<br />
► Trusted. Trusted applications are applications with digital signatures of trusted vendors and<br />
applications signatures of those are included to the trusted applications database.<br />
<strong>Application</strong>s of that group are allowed to perform any network activity. Activities of such<br />
applications are monitored by Proactive Defense and File Anti-Virus.<br />
► Low Restricted. Low restricted applications are applications which are without digital<br />
signatures of trusted vendors and which are not included to the trusted applications<br />
database. Nevertheless, the low risk rating 3<br />
. is assigned to such applications. <strong>Application</strong>s<br />
of that group are allowed to perform some operations, to manage the system, hidden<br />
access to the network. Most operations require user authorization.<br />
► High Restricted. High restricted applications are applications without digital signatures and<br />
which are not included to the trusted applications database. The high risk rating is assigned<br />
to such applications. <strong>Application</strong>s of this group require user authorization for most activities<br />
in the system; some actions, however, are restricted for these applications.<br />
1 <strong>Kaspersky</strong> Security Network is a system which allows to get information about files opened by the user on the<br />
computer and thus tracks malicious objects and their spreading channels.<br />
2 Digital signature is an electronic security mark which carries the information about the software vendor and shows if<br />
the software was changed after the signing (i.e. after release). If software is signed by its vendor and the signature<br />
authenticity is verified by the certificate center, then you can be sure that the software is authentic and was not.<br />
16 Risk rating is an indicator of the application danger for the system. The risk rating is calculated based on definite<br />
criteria.<br />
3 | 28