skip to main content

Using Deep Freeze Cloud Console : Anti-Executable Service : Protection Settings

Protection Settings
Configure the following settings:
Protection Status
Enable Protection - select this option to launch only the approved applications.
Disable Protection - select this option to launch all applications.
 
Settings
Deployment options
Choose one of the following deployment options:
Option 1: Staged Deployment
Staged Deployment on computers with unauthorized software. Select this option and click Next. The staged deployment has 3 steps:
Allow All Windows OS files - add all Windows OS files to the Local Control List as Allowed.
 
Stage 2 - Partial Protection (enforce Policy Control List and Allow Unknown files): In this Stage, files specified in the Policy Control List are Allowed or Blocked as defined. All files not specified in the Policy Control List (unknown files) are allowed to execute and reported as violations in the Anti-Executable Dashboard.
Allow All Windows OS files - add all Windows OS files to the Local Control List as Allowed.
Allow All Windows OS files - add all Windows OS files to the Local Control List as Allowed.
Option 2: Deploy on newly Installed or Imaged computer environment
This option authorizes everything thats pre-installed on the computer for execution and creates a Local Control List. All executables installed on the computer are allowed to run unless it is explicitly blocked in the Anti-Executable Dashboard.
In this option, the Policy Control List is enforced. Unknown Files are blocked and violations logged in the Anti-Executable Dashboard.
 
Option 3: Custom Deployment
The custom deployment is based on your unique requirement which can be configured in the policy. Configure the following settings:
Authorization Settings
Enforce. Log Violations - enforce the Policy Control List and log the violations in the Anti-Executable Dashboard. The files will be Allowed or Blocked as specified in the Policy Control List.
Do Not Enforce. Log Violations - do not enforce the Policy Control List and log the violations in the Anti-Executable Dashboard.
Allow and Log Violations - allow the files to run and log the violations in the Anti-Executable Dashboard.
Block and Log Violations - block the files and log the violations in the Anti-Executable Dashboard.
Scan all files and create a Local Control List during installation - scan the computer and create a Local Control List of all files present on the computer when the Anti-Executable Client is installed.
Allow All Windows OS files - add all Windows OS files to the Local Control List as Allowed.