Version 5.30 (February 2014)
- Support for Windows 8.1
Version 5.20 (November 2012)
- Support for Windows 8.
- Support for Windows Server 2012.
- Ability to open the log file directly from the UI.
- Anti-Executable is now available in Portuguese (Brazilian).
Version 5.10 (July 2012)
- Active Directory Integration
Active Directory users and groups can directly be added as Anti-Executable administrators and trusted users.
- New Reporting Database
Efficient reporting possible with the new Reporting Database.
- New Reports
Two new reports Top Blocked Programs and Top Violated Machines now available.
- UI and UX Improvements:
- Detailed information displayed to the user when a file is blocked.
- Detailed progress bar with time estimations is now visible while scanning the computer.
- Anti-Executable is now launched by double-clicking the Anti-Executable icon in the system tray.
Version 5.00 (April 2012)
• Central Control List
The Central Control List represents a collection of all files and publishers that can be used to create and enforce Anti-Executable policies. The entries in the Central Control List do not contain Allow or Block parameters and such actions are configured via Anti-Executable Policies.
Policies are used as the vehicle for enforcing specific configurations of Anti-Executable. A policy contains configuration of file, folder, publisher control attributes, alerts, temporary execution mode details, and general settings.
• Granular control of Publishers
Publishers can be controlled on four different levels: Certificate, Product Name, Program File and File Version.
• Three New Reports
Three new reports are available: Additions to Local Control List, Addition to Central Control List – Files, and Addition to Central Control List – Publishers.
• User Interface Improvements
The following user interface improvements are available: In-column search and filtering when navigating control lists, Provisioning of Anti-Executable users based on local and domain accounts, and Alert dialog.
• Deprecated Features
Blocking of Publishers
Anti-Executable no longer provides an ability to block a specific Publisher. Since Anti-Executable works on default deny principle, only programs that are explicitly allowed to run will execute, leaving any unauthorized program as blocked. With the added flexibility of publisher control on publisher, program, file and version levels, an administrator can allow only a specific version of a particular file within a program entry of a publisher certificate. This will eliminate program version fragmentation and only allow a specific version of a product to run.
Dedicated Whitelist or Blacklist
Having a dedicated whitelist of blacklist can be confusing to a user as the same executable can be allowed to run on one computer, but blocked on another. This is why an execution control list has been created and the local control list is augmented by policies that specify whether a program is blocked or allowed to run. Blocking action always takes precedence.
• Initiate a New Whitelist Scan
Initiate a New Whitelist Scan on the managed workstation from Faronics Core Console. This allows administrators to re-scan, re-create and re-apply the Whitelist on the workstation where an Active Whitelist already exists.
• Integration with Faronics Anti-Virus
Automatically scan files using Faronics Anti-Virus before adding them to the whitelist.
• Better control on .dll files
Unauthorized .dll files loaded from a network location are now blocked on Windows Vista.
• Enhanced Security
Various operating system components are more secure due to enhanced security.
Checks files against a signature database to gather more information on the file. Reports on manufacturer name, file hash, version, how many applications use a file, and whether file is malicious.
• Temporary Execution Mode (TEM)
Allows unrestricted file execution for a specific time period.
• TEM Reporting
Ability to run a report on executed programs during Temporary Execution Mode.
• .dll File Control:
Anti-Executable now optionally supports .dll files.
• Stability and Security Enhancements
Numerous stability and security enhancements have been added with an improved embedded driver. These enhancements require a reboot of the target workstations after installation.
• Publisher Entries for Whitelist and Blacklist
Anti-Executable can now allow or block the executables based on the digital signature.
• Granularity in Export or Import of configuration
Anti-Executable configuration can now be exported or imported based on Active Whitelists and Blacklists, alert image, and Anti-Executable users.
• Improved Whitelist and Blacklist Editor
Whitelist and Blacklist Editors now display number of files in the list and number of files selected. The columns in the Whitelist or Blacklist Editors can be displayed, hidden, or rearranged.
• Supported on Windows 7.
• Supported on Faronics Core v3.1 or later.
• Compatible with Deep Freeze Maintenance Mode (requires Deep Freeze Enterprise v6.61 or later):
Anti-Executable can be configured to automatically enter Maintenance Mode when Deep Freeze enters its Maintenance Mode.
• Black List Option:
Any program on a Black List will not run even if it is present in the Active White List.
• Export to CSV:
White List and Black List files can be exported to CSV format.
• UNC Path Option:
Administrators can optionally add files to a White List or Black List by entering the path to the target file or folder.
• Event Log Viewer:
The Event Log can be opened directly from the Anti-Executable UI.
• Stealth Mode Granularity:
Stealth Mode now allows for three options to be configured independently: Hide notification, Hide icon on system tray, and Hide splash window.
• Command Line (CLI) Improvements:
The Anti-Executable password can now be specified in the same line as the actual command, allowing the CLI to be more suited for use in unattended scripts or batch files.
Additional CLI options added.
• Support added for the Active Tasks feature of Faronics Core Console v2.42.
• Maintenance Mode:
Temporarily disable Anti-Executable protection while software updates or new software are installed. When the installations are finished, Anti-Executable will automatically incorporate any new or modified executable files to the active White List.
• Automatic White List:
Optionally set Anti-Executable to create and apply a White List on installation.
• White List Date Stamp:
The White List Editor has a new column showing the date the executable was added to the White List.
• Support for Windows Server 2008 (32- and 64-bit).
• Remote White List scanning of workstations.
• Ability to scan multiple locations in a single operation when creating a White List.
• Search field added to the White List Editor.
• Merging White Lists.
• Automatic selection of the appropriate MSI installable file while pushing installation to a target machine from Faronics Core Console.
• Automatically retrieving the configuration of a workstation whenever a single workstation is selected.
• Events logged to a custom log within the Event Viewer.
• Anti-Executable Administrator requires a password.
• Localization in Simplified Chinese.
• Loadin installer is now an executable file (.exe):
The installer detects the system Locale and starts the program in the appropriate language.
• Modified White List Editor:
While editing an Active White List through the White List Editor, an Apply button appears on the White List Editor instead of the Save button. On clicking the Apply button, Anti-Executable will immediately apply the changes made to the Active White List.
• Command Line Interface:
The Command Line Interface is now a separate application (AEC.exe).
• New White List scanning and parsing architecture
• Multiple White Lists available
• Central White List management and deployment
• White Lists can be viewed and edited
• White Folder feature added to exempt a CD-ROM, USB device, disk, or network drive from Anti-Executable protection
• Windows 2000/XP 32-bit/XP 64-bit/Vista 32-bit/Vista 64-bit support added and Windows 95/98/Me support dropped
• Faronics Core Console support (for central deployment, configuration, scheduling, and control)
• Allow or Block execution of applications from local CD-ROM / DVD drives while Anti-Executable is On
• Block workstation mouse and keyboard input directly from the Anti-Executable Enterprise Console
• Ability to specify where the log file is saved
• Provide a SUS/WSUS server address to allow the download of Windows Updates
• Ability to minimize the white list scanning process during installation
• Improved “under the hood” Console functionality
• Log viewing capability centrally from the Enterprise Console
• Central log exportable to a .csv format and includes fields such as: domain, workstation name, user, date, time, and program that tried to execute
• Added an Exempted Folders feature to include all subfolders within a directory
• Added a Trusted Applications feature to include all executables recursively within a specified directory
• Japanese localization
• Added WSUS support
First official release