Stage 1 - Audit only: Logs which files are launched by the users or the system. It is recommended to leave stage 1 for 7-30 days to collect information about all the files used on the computers. Go to the
Anti-Executable Dashboard to define which files are to be Allowed or Blocked in the
Policy Control List. All files are allowed to run in this stage.
Stage 2 - Partial Protection: The
Policy Control List is enforced. All files not specified in the
Policy Control List (Unknown Files) are allowed and reported as violations in the
Anti-Executable Dashboard.
Final Stage - Full Protection: The
Policy Control List is enforced. All files not specified in the
Policy Control List (Unknown Files) are blocked and reported as violations in the
Anti-Executable Dashboard.