Application control overview (2024)

Application control provides another layer of protection — on top of patch management, antivirus, anti-spyware, and firewall configuration — to prevent the intrusion of malicious activity on your managed devices. Application control continuously monitors specified processes, files, applications, and registry keys to prevent unauthorized behavior. You control which applications run on devices and how they are allowed to execute.

Because it is a rule-based system, instead of a definition-based (i.e., signature-based) system, application control is more effective at protecting systems against zero-day attacks (malicious exploitation of vulnerable code before exposures are discovered, defined, and patches made available).

Unlike vulnerability detection and remediation, spyware detection and removal, or antivirus scanning and quarantine; application control protection does not require ongoing file updates, such as patch files, definition/pattern files, or signature database files.

Application control protects servers and workstations by placing software agents between applications and the operating system’s kernel. Using predetermined rules based upon the typical behavior of malware attacks, these systems evaluate activities such as network connection requests, attempts to read or write to memory, or attempts to access specific applications. Behavior known to be good is allowed, behavior known to be bad is blocked, and suspicious behavior is flagged for further evaluation.

The Application control settings are accessed from the main console (Tools > Security and Compliance > Agent Settings). The Application control agent setting lets you create application control agent installation, update, and removal tasks; configure application control settings that can be deployed to targeted devices you want to protect; and customize application control display/interaction settings that determine how application control appears and operates on managed devices, and which interactive options are available to end users. You can also view endpoint security activity and status information for protected devices in the Security activity tool (Tools > Security and Compliance > Security activity).

Component of Endpoint Security

Application control is one of the components of the comprehensive Endpoint Security solution, along with the Location Awareness (network connection control), Ivanti Firewall, and Device Control tools.

Proactive security

Application control proactively protects your managed devices from by:

  • Providing kernel-level protection against applications that would attempt to modify binaries (or any files you specify) on your machine or application memory of running processes. It will also block changes to certain areas of the registry and can detect rootkit processes.
  • Using memory protection against buffer-overflow and heap exploits.
  • Executing protection schemes to keep an attacker from building and executing code in a data segment.
  • Watching for unauthorized or unusual file access.
  • Offering real-time protection for your computer without relying on signature databases.

System-level security

Application control offers the following system-level security:

  • Kernel-level, rule-based file-system protection
  • Registry protection
  • Startup control
  • Detection of stealth rootkits
  • Network filtering
  • Process and file/application certification
  • File protection rules that restrict actions that executable programs can perform on specified files

Application control console features

Application control provides administrators with the ability to define and manage separate profiles for different user groups with application control settings. Endpoint security settings accommodate the needs of any and all user groups by allowing administrators to create multiple, highly flexible configurations for different user profiles.

Application control settings can include custom password protection, WinTrust handling, protection mode, custom allow and deny lists, network and application access control policies, file certifications, and file protection rules.

Application control client features

The Endpoint Security client (deployed to managed devices) gives administrators a powerful new tool for controlling what applications run on enterprise desktops and servers, and how those applications are allowed to execute.

Application control client software uses proven heuristic and behavior-recognition techniques to recognize typical patterns and actions of malicious code. For example, a file that attempts to write to the system registry could be blocked and flagged as potentially malicious. The application control component uses a variety of proprietary techniques to reliably detect malware even before a signature has been identified.

Supported device platforms and antivirus products

For up-to-date detailed information on which device platforms and antivirus products support application control (endpoint security), see the endpoint security FAQ on the Ivanti User Community:

Endpoint Protection Frequently Asked Questions

IMPORTANT: Endpoint security is not supported on core servers or rollup cores
You should not install/deploy endpoint security to a core server or a rollup core. However, you can deploy endpoint security on an additional console.

Do NOT deploy application control to devices with any other antivirus product installed.

Application control licensing

In order to use Endpoint Security and application control, you must first activate your core server with a license that allows their use.

For information about licensing, contact your reseller, or visit the Ivanti website:

Ivanti Home Page

Role-based administration with endpoint security

Endpoint security, like Patch and Compliance, uses role-based administration to allow users access to features. Role-based administration is the access and security framework that lets Ivanti Administrators restrict user access to tools and devices. Each user is assigned specific roles and scope that determine which features they can use and which devices they can manage.

Administrators assign these roles to other users with the Users tool in the console. Endpoint security is included in the Agent Settings right, which appears under the Security rights group in the Roles dialog box. In order to see and use endpoint security features, a user must be assigned the necessary Agent Settings access rights.

With the Agent Settings right, you can provide users the ability to:

  • See and access the endpoint security features in the console's Tools menu and Toolbox
  • Configure managed devices for endpoint security protection
  • Manage endpoint security settings (password protection, signed code handling, action, protection mode, file certifications, file protection rules, etc.)
  • Deploy endpoint security install or update tasks, and change settings tasks
  • View endpoint security activity for protected devices
  • Define endpoint security data threshold settings for recording and displaying endpoint security activity

Endpoint security main tasks outline

The list below outlines the main tasks involved in configuring, implementing, and using endpoint security protection. See feature-specific help topics for detailed conceptual and procedural information.

  • Configure managed devices for endpoint security protection (deploying the agent to target devices).
  • Configure endpoint security options with endpoint security settings, such as signed code handling, protection mode, allow and deny lists (applications allowed to execute on devices), file certifications, file protection rules, and end user interactive options.
  • Discover file and application behavior on devices with the endpoint security learn mode.
  • Enforce endpoint securityprotection on managed devices with the endpoint security automatic block mode.
  • View endpoint security activity for protected devices.
Application control overview (2024)
Top Articles
Here's a complete rundown of Wall Street's 2024 stock market predictions
What 2024 S&P 500 forecasts really say about the stock market
Rosy Boa Snake — Turtle Bay
Durr Burger Inflatable
Dairy Queen Lobby Hours
Cold Air Intake - High-flow, Roto-mold Tube - TOYOTA TACOMA V6-4.0
Www.craigslist Virginia
Valley Fair Tickets Costco
Nwi Police Blotter
Wells Fargo Careers Log In
Cumberland Maryland Craigslist
How To Get Free Credits On Smartjailmail
What's New on Hulu in October 2023
Hijab Hookup Trendy
Gma Deals And Steals Today 2022
Enterprise Car Sales Jacksonville Used Cars
Truth Of God Schedule 2023
Ostateillustrated Com Message Boards
How pharmacies can help
Bank Of America Financial Center Irvington Photos
Teen Vogue Video Series
Johnnie Walker Double Black Costco
Mandy Rose - WWE News, Rumors, & Updates
Malluvilla In Malayalam Movies Download
Medline Industries, LP hiring Warehouse Operator - Salt Lake City in Salt Lake City, UT | LinkedIn
Gunsmoke Tv Series Wiki
Lcsc Skyward
Publix Christmas Dinner 2022
Till The End Of The Moon Ep 13 Eng Sub
Sports Clips Flowood Ms
Mg Char Grill
Palmadise Rv Lot
Boondock Eddie's Menu
How to Watch the X Trilogy Starring Mia Goth in Chronological Order
The Best Carry-On Suitcases 2024, Tested and Reviewed by Travel Editors | SmarterTravel
Toonily The Carry
Vivek Flowers Chantilly
Crazy Balls 3D Racing . Online Games . BrightestGames.com
Barber Gym Quantico Hours
D-Day: Learn about the D-Day Invasion
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
18 terrible things that happened on Friday the 13th
Infinite Campus Farmingdale
Ezpawn Online Payment
Subdomain Finder
Walmart 24 Hrs Pharmacy
Oklahoma City Farm & Garden Craigslist
Okta Login Nordstrom
Unpleasant Realities Nyt
Convert Celsius to Kelvin
How Did Natalie Earnheart Lose Weight
Cataz.net Android Movies Apk
Latest Posts
Article information

Author: Mrs. Angelic Larkin

Last Updated:

Views: 6111

Rating: 4.7 / 5 (47 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Mrs. Angelic Larkin

Birthday: 1992-06-28

Address: Apt. 413 8275 Mueller Overpass, South Magnolia, IA 99527-6023

Phone: +6824704719725

Job: District Real-Estate Facilitator

Hobby: Letterboxing, Vacation, Poi, Homebrewing, Mountain biking, Slacklining, Cabaret

Introduction: My name is Mrs. Angelic Larkin, I am a cute, charming, funny, determined, inexpensive, joyous, cheerful person who loves writing and wants to share my knowledge and understanding with you.