Faronics Anti-Executable Standard/Server Standard Feature History

Version 5.30 (February 2014)

  • Support for Windows 8.1

Version 5.20 (November 2012)

  • Support for Windows 8.
  • Support for Windows Server 2012.
  • New Reporting Feature: Anti-Executable Standard now has the ability to display a report of Most Blocked Programs for a date range.
  • Ability to open the log file directly from the UI.
  • Anti-Executable is now available in Portuguese (Brazilian).

Version 5.10 (July 2012)

  • Active Directory Integration
    Active Directory users and groups can directly be added as Anti-Executable administrators and trusted users.
  • UI and UX Improvements:
    • Detailed information displayed to the user when a file is blocked.
    • Detailed progress bar with time estimations is now visible while scanning the computer.
    • Anti-Executable is now launched by double-clicking the Anti-Executable icon in the system tray.

Version 5.00 (April 2012)

• Granular control of Publishers

Publishers can be controlled on four different levels: Certificate, Product Name, Program File and File Version.

• Three New Reports

Three new reports are available: Additions to Local Control List,  Addition to Central Control List – Files, and Addition to Central Control List – Publishers.

• User Interface Improvements

The following user interface improvements are available: In-column search and filtering when navigating control lists, Provisioning of Anti-Executable users based on local and domain accounts, and Alert dialog.

• Deprecated Features

Blocking of Publishers

Anti-Executable no longer provides an ability to block a specific Publisher. Since Anti-Executable works on default deny principle, only programs that are explicitly allowed to run will execute, leaving any unauthorized program as blocked. With the added flexibility of publisher control on publisher, program, file and version levels, an administrator can allow only a specific version of a particular file within a program entry of a publisher certificate. This will eliminate program version fragmentation and only allow a specific version of a product to run.

Dedicated Whitelist or Blacklist

Having a dedicated whitelist of blacklist can be confusing to a user as the same executable can be allowed to run on one computer, but blocked on another. This is why an execution control list has been created and the local control list is augmented by policies that specify whether a program is blocked or allowed to run. Blocking action always takes precedence.

 

Version 4.2

• Integration with Faronics Anti-Virus

Automatically scan files using Faronics Anti-Virus before adding them to the whitelist.

 

Version 4.1

• Better control on .dll files

Unauthorized .dll files loaded from a network location are now blocked on Windows Vista.

• Enhanced Security

Various operating system components are more secure due to enhanced security.

 

Version 4.0

• Identifile

Checks files against a signature database to gather more information on the file. Reports on manufacturer name, file hash, version, how many applications use a file, and whether file is malicious.

• Temporary Execution Mode (TEM)

Allows unrestricted file execution for a specific time period.

• TEM Reporting

Ability to run a report on executed programs during Temporary Execution Mode.

• .dll File Control

Anti-Executable now optionally supports .dll files.

• Stability and Security Enhancements

Numerous stability and security enhancements have been added with an improved embedded driver. These enhancements require a reboot of the target workstations after installation.

 

Version 3.6

• Publisher Entries for Whitelist and Blacklist

Anti-Executable can now allow or block the executables based on the digital signature.

• Granularity in Export or Import of configuration

Anti-Executable configuration can now be exported or imported based on Active Whitelists and Blacklists, alert image, and Anti-Executable users.

• Improved Whitelist and Blacklist Editor

Whitelist and Blacklist Editors now display number of files in the list and number of files selected. The columns in the Whitelist or Blacklist Editors can be displayed, hidden, or rearranged.

 

Version 3.5

•    Supported on Windows 7.

 

Version 3.4

• Compatible with Deep Freeze Maintenance Mode (requires Deep Freeze Enterprise v6.61 or later):

Anti-Executable can be configured to automatically enter Maintenance Mode when Deep Freeze enters its Maintenance Mode.

• Black List Option:

Any program on a Black List will not run even if it is present in the Active White List.

• Export to CSV:

White List and Black List files can be exported to CSV format.

• UNC Path Option:

Administrators can optionally add files to a White List or Black List by entering the path to the target file or folder.

• Event Log Viewer:

The Event Log can be opened directly from the Anti-Executable UI.

• Stealth Mode Granularity:

Stealth Mode now allows for three options to be configured independently: Hide notification, Hide icon on system tray, and Hide splash window.

 

Version 3.3

• Maintenance Mode:

Temporarily disable Anti-Executable protection while software updates or new software are installed. When the installations are finished, Anti-Executable will automatically incorporate any new or modified executable files to the active White List.

• Automatic White List:

Optionally set Anti-Executable to create and apply a White List on installation.

• White List Date Stamp:

The White List Editor has a new column showing the date the executable was added to the White List.

• Support for Windows Server 2008 (32- and 64-bit).

 

Version 3.2

•    Ability to scan multiple locations in a single operation when creating a White List.

•    Search field added to the White List Editor.

•    Merging White Lists.

•    Events logged to a custom log within the Event Viewer.

•    Anti-Executable Administrator requires a password.

•    Localization in Simplified Chinese.

 

Version 3.1

•     Modified White List Editor:

While editing an Active White List through the White List Editor, an Apply button appears on the White List Editor instead of the Save button. On clicking the Apply button, Anti-Executable will immediately apply the changes made to the Active White List.

 

Version 3.0

•    New White List scanning and parsing architecture

•    Multiple White Lists available

•    Central White List management and deployment

•    White Lists can be viewed and edited

•    White Folder feature added to exempt a CD-ROM, USB device, disk, or network drive from Anti-Executable protection

•    Windows 2000/XP 32-bit/XP 64-bit/Vista 32-bit/Vista 64-bit support added and Windows 95/98/Me support dropped

 

Version 2.3

•     Allow or Block execution of applications from local CD-ROM / DVD drives while Anti-Executable is On

•     Ability to specify where the log file is saved

•     Ability to minimize the white list scanning process during installation

 

Version 2.2

•     Added an Exempted Folders feature to include all subfolders within a directory

•     Added a Trusted Applications feature to include all executables recursively within a specified directory

 

Version 2.1

•     Japanese localization

 

Version 2.0

First official release