210
How Application Control and System Control Work Together?
When Application Control detects an outbound connection attempt, and
when it is set to prompt the user to decide whether to allow or deny the
connection, you can set Application Control to check from System Control
whether the connection should be allowed. This reduces the amount of
Application Control pop-ups shown to users.
An example:
1.
If there is a rule for the application that tries to open an outbound
connection in the
Application Rules for Known Applications
table,
Application Control allows or denies the connection attempt based on
this rule.
2.
If there is no rule for the application in the
Application Rules for
Known Applications
table, Application Control allows or denies the
connection attempt based on the currently defined
Default action for
client applications
.
3.
If the currently specified default action is
Prompt for user decision
,
and if the
Do not prompt for applications that System Control has
identified
setting is enabled, Application Control checks from System
Control whether it should allow the outbound connection. If System
Control now identifies the application, the end user is not prompted
for decision, and the outbound connection is allowed.
4.
If System Control did not identify the application, the user is prompted
to decide whether to allow or deny the connection.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...