![Fortinet FortiGate Voice 4.0 MR1 Administration Manual Download Page 41](http://html1.mh-extra.com/html/fortinet/fortigate-voice-4-0-mr1/fortigate-voice-4-0-mr1_administration-manual_2322091041.webp)
Endpoint Network Access Control
Enabling Endpoint Control
FortiClient Endpoint Security Version 4.0 MR1 Administration Guide
04-40001-99556-20090626
35
http://docs.fortinet.com/
•
Feedback
9
For all other applications that are not specified in the list, select if you want to Allow,
Deny, or Monitor.
10
Click
OK
.
Table 2: Application groups and category definitions.
Category
Description
Security
Anti-Malware
Software
Software that detects, filters, and eliminates malicious content.
Authentication
and
Authorization
Software that restricts access to and use of the computer and its
contents to authorized users and authorized uses.
Encryption, PKI Software that enables the encryption and decryption of data for security
purposes.
Firewalls
Software that protects the desktop from unauthorized remote access.
Hacking
Software used to attack or evade access controls and privacy
measures on other computers.
Potentially
Unwanted
Software
Technologies that alter the operation of the user's hardware, software,
or network in ways that diminish control over the user experience,
privacy, or the collection and distribution of personal information.
Proxy
Avoidance
Applications that enable or facilitate the avoidance or bypassing of
proxy server features.
Remote Access Software that enables authorized access to and use of a desktop
computer or private network from a remote location.
System Audit
Software used to monitor and log activity on a computer network,
including both legitimate use and attempts to access or use network
assets in unauthorized fashion, and to assess the status and security of
the network.
Multimedia
Media Players
Software that enables the creation and playback of audio or video files.
Communication
Groupware
Software that enables the sharing of files and applications across work
groups, networks, or enterprises and provides communication and
shared workspace for groups.
Internet
Browsers
Software that interprets content and presents it on the desktop screen;
excludes browsers dedicated to a single or limited sources.
Software that enables the receiving, display, composing, and sending of
email from the desktop. Includes the client side of network applications
(e.g. Microsoft Outlook) and bulk email software, but not email
applications built into web browsers.
Instant
Messaging
Software that enables the sending and receiving of synchronous, real-
time messages on the desktop. (Also known as chat-room software.)
P2P File
Sharing
Software that enables file search and sharing across a network without
dependence on a central server.
Telephony,
Conferencing,
Fax
Software that enables telephonic transmission of voice and other data,
including software for BBS, IP telephony, and dial-up internet access.
Critical Functions
Never Block
Executables needed to enable the desktop machine to perform its basic
functions prior to the use of added applications.
Entertainment
Adult
Software that includes depictions of nudity or sexual activity or other
elements that might be objectionable to non-consenting users.