- Security
- Protects against malware, spyware, and unwanted software
- Whitelist based on cryptographic hash to ensure that files not present in the whitelist will not run
- Anti-Executable is self protected to ensure that only authorized users can configure and disable it
- Whitelist Features
- Automatic creation of workstation whitelist
- Whitelists can be imported, exported, viewed, edited, searched, merged, and sorted
- Multiple whitelist support
- Centralized whitelist deployment
- White folder feature allows folder, CD-ROM, USB, disk, or network drive to be exempt from the whitelist
- Definition files do not need to be updated
- Creates a log of all unauthorized installation attempts
- Scanning of remote workstations to create the whitelist
- Whitelists can be activated/deactivated based on a schedule
- Compatibility Options
- Compatible with major third-party antivirus and anti-spyware applications
- Complements Active Directory and Group Policies
- Compatible with fast user switching
- Offers option to designate specific applications, such as antivirus programs, to be Trusted and exempt from restriction
- Maintenance Mode allows software updates and installation of new software
- Automatically enters Maintenance Mode when it detects that a Deep Freeze Maintenance Event has Thawed the computer
- Expanded Protection and Control
- Blacklist can also be activated for additional layer of protection
- Any executable on the blacklist will be blocked from running
- File, publisher, and path based entries allowed on whitelists and blacklists
- Provides password protection for complete security
- Offers ability to enable or disable Anti-Executable on the fly
- Deploy as part of a master image
- Displays a customized violation message when a user attempts to perform an action that is not authorized by Anti-Executable
- Unique protection levels for Administrators, Trusted, and External users
- Stealth Mode that allows to hide the presence of Anti-Executable while keeping the computer fully protected
- Expanded Flexibility Options
- Allow or block execution of applications from USB and CD/DVD drives
- Import/Export granularity for whitelists/blacklists allow users to choose only the information they require
- Flexible Whitelist and Blacklist Editors for simplified management
- Schedule shutdown, restart, and Wake-on-LAN actions
- Enterprise Control
- Faronics Core provides centralized deployment, configuration, scheduling, and control
- Rapidly install Anti-Executable on any or all workstations
- Selectively activate/deactivate protection on one or more workstations
- Manage and export log records of violation attempts
- Change maintenance schedules on the fly
- Group and filter workstations for easy management
- Instantly update passwords on protected workstations
- Communicate with workstations over a LAN, WAN or the Internet
- Power on workstations using Wake-on-LAN technology
- Active Task feature ensures changes are applied to unavailable workstations by resending tasks when the computer can be reached
- Log all application launches and software installations, without enabling protection with Audit Mode
- Learn from users interactions and build a comprehensive control list and move from audit mode to partial or full protection mode with Staged Deployment
- Review application violation information in the context of individual files or computers and take informed actions using dynamic and filterable widgets and grids.
- Define alert thresholds so administrators can receive proactive notifications for any unauthorized or malicious activity
- Optimizes system settings to overcome vulnerabilities and get maximum prevention from ransomware attacks
- Management, deployment and configuration via a web-based console or a mobile app
Anti-Executable
Available as an optional add-on via Deep Freeze Cloud Connector
Available
Optional