Enable Protection - select this option to launch only the approved applications.Disable Protection - select this option to launch all applications.Staged Deployment on computers with unauthorized software. Select this option and click Next. The staged deployment has 3 steps:
• Allow All Windows OS files - add all Windows OS files to the Local Control List as Allowed.
• Stage 2 - Partial Protection (enforce Policy Control List and Allow Unknown files): In this Stage, files specified in the Policy Control List are Allowed or Blocked as defined. All files not specified in the Policy Control List (unknown files) are allowed to execute and reported as violations in the Anti-Executable Dashboard.
• Allow All Windows OS files - add all Windows OS files to the Local Control List as Allowed.
• Final Stage - Full Protection (Enforce Policy Control List and Block Unknown files): In this stage, the Policy Control List is enforced and all Unknown files are blocked. Files specified in the Policy Control List are Allowed or Blocked as defined. All files not specified in the Policy Control List (Unknown Files) are Blocked and reported as violations in the Anti-Executable Dashboard.
• Allow All Windows OS files - add all Windows OS files to the Local Control List as Allowed.This option authorizes everything thats pre-installed on the computer for execution and creates a Local Control List. All executables installed on the computer are allowed to run unless it is explicitly blocked in the Anti-Executable Dashboard.In this option, the Policy Control List is enforced. Unknown Files are blocked and violations logged in the Anti-Executable Dashboard.
To globally block files on client computers, add those files as Blocked in Policy Control List.
— Enforce. Log Violations - enforce the Policy Control List and log the violations in the Anti-Executable Dashboard. The files will be Allowed or Blocked as specified in the Policy Control List.
— Do Not Enforce. Log Violations - do not enforce the Policy Control List and log the violations in the Anti-Executable Dashboard.
— Allow and Log Violations - allow the files to run and log the violations in the Anti-Executable Dashboard.
— Block and Log Violations - block the files and log the violations in the Anti-Executable Dashboard.
• Scan all files and create a Local Control List during installation - scan the computer and create a Local Control List of all files present on the computer when the Anti-Executable Client is installed.
• Allow All Windows OS files - add all Windows OS files to the Local Control List as Allowed.