background image

 

|

21

 

 Anti-Executable Standard User Guide

Using Anti-Executable

This chapter describes the procedure to access, configure and use Anti-Executable.

Topics

Accessing Anti-Executable

Status Tab

White List Tab

Adding Executables to the Active White List

Black List Tab

Users Tab

Setup Tab

Содержание ANTI-EXECUTABLE STANDARD

Страница 1: ...Anti Executable Standard User Guide 1...

Страница 2: ...d Faronics Deep Freeze Faronics Core Console Faronics Anti Executable Faronics Device Filter Faronics Power Save Faronics Insight Faronics System Profiler and WINSelect are trademarks and or registere...

Страница 3: ...ti Executable Maintenance Mode 24 Exporting Anti Executable Configurations 24 White List Tab 25 Using the White List Editor 25 Creating a New White List 26 Activating a White List 29 Adding Executable...

Страница 4: ...Anti Executable Standard User Guide 4 Contents Customizing Alerts 41 Uninstalling Anti Executable 43 Uninstalling using the Setup Wizard 44...

Страница 5: ...Anti Executable Standard User Guide 5 Preface Anti Executable protects computers by preventing unauthorized executables from running Topics Important Information Technical Support Definition of Terms...

Страница 6: ...technology professionals Fueled by a market centric focus Faronics technology innovations benefit educational institutions health care facilities libraries government organizations and corporations Pr...

Страница 7: ...ne 800 943 6422 or 604 637 3333 Hours Monday to Friday 7 00am to 5 00pm Pacific Time Contact Information Web www faronics com Email sales faronics com Phone 800 943 6422 or 604 637 3333 Fax 800 943 64...

Страница 8: ...able or Disable Trusted Users cannot uninstall upgrade Anti Executable Authorized Executable An Executable that is in the Active White List and therefore can be launched Black Folder A folder and its...

Страница 9: ...en from being displayed Trusted Executable A Trusted executable can launch other executables that themselves are unauthorized Unauthorized Executable An Unauthorized executable is one that is not in t...

Страница 10: ...Standard User Guide 10 Introduction Introduction Anti Executable protects computers by preventing unauthorized executables from running Topics Anti Executable Overview System Requirements Anti Execut...

Страница 11: ...the protection that you need Choose the Anti Executable edition that bests suits your needs Enterprise versions allow to protect multiple computers from a central console called Faronics Core Console...

Страница 12: ...System Requirements Anti Executable can be installed on the following Operating Systems 32 bit edition of Windows XP SP3 and 64 bit edition of Windows XP SP2 32 and 64 bit editions of Windows Server 2...

Страница 13: ...version requires a valid License Key in order to protect the machine License information can be obtained by Anti Executable Administrator through the Anti Executable Status tab To upgrade from an Eva...

Страница 14: ...Anti Executable Standard User Guide 14 Introduction...

Страница 15: ...15 Anti Executable Standard User Guide Installing Anti Executable This chapter describes the installation process of Anti Executable Topics Installation Overview Installing Anti Executable...

Страница 16: ...r 2008 Windows XP SP3 and Windows Vista Before installing verify the operating system version and choose the installer from the following list System Install File Windows XP Vista 32 bit AEStd_32 bit...

Страница 17: ...nternet double click AEStd_32 bit_en msi for a 32 bit Operating System or AEStd_64 bit_en msi for a 64 bit Operating System to begin the installation process Click Next to continue 2 Read and accept t...

Страница 18: ...tall location The default is C Program Files Faronics AE Click Next to continue 5 This step is optional Specify the Anti Executable Administrator and Trusted User passwords These passwords can also be...

Страница 19: ...tomatic Scanning and White List Creation dialog is displayed Select Enable if you want Anti Executable to automatically scan all non removable drives on the computer and create a White List Click Inst...

Страница 20: ...art is recommended following installation If the Enable check box is selected in the Automatic Scanning and White List Creation dialog Protection is enabled and there is an Active White List when the...

Страница 21: ...Using Anti Executable This chapter describes the procedure to access configure and use Anti Executable Topics Accessing Anti Executable Status Tab White List Tab Adding Executables to the Active White...

Страница 22: ...ss Anti Executable if those passwords have been set Using Anti Executable Following installation Anti Executable must be configured Anti Executable Administrators can access all the following tabs Sta...

Страница 23: ...Click Update for more information If an Evaluation version of Anti Executable has been installed the Valid until field displays the date when Anti Executable expires Anti Executable displays a notific...

Страница 24: ...tions Anti Executable Administrators can save multiple configurations which can be applied to other machines If a White List has been set as Active it is also included in the configuration export To s...

Страница 25: ...rs from which any executable can be launched There can only be one White List active at a time Refer to the section titled Creating a New White List for information on creating the first White List Us...

Страница 26: ...White List complete the following steps 1 Shift double click the Anti Executable icon in the System Tray Alternatively you can also use the Ctrl Alt Shift F10 hotkey Specify the Administrator passwor...

Страница 27: ...on locally Click My Network Places browse and select a remote workstation for remote scanning The Scan feature searches the selected location and its sub directories for any executable files files con...

Страница 28: ...List are merged with the scanned list of files or executables Click Save to save the White List with the same name Click Save As to save the merged White List with a different name To search for a pa...

Страница 29: ...n existing White List This location can be local external or on a network Click Scan to launch the White List Scan Destination dialog This will search the selected location for any executables Once th...

Страница 30: ...Active White List The next time the executable is launched it will be blocked again Deny The executable is not added to the Active White List and remains an unauthorized executable It is not permitte...

Страница 31: ...lders from which all executables are blocked There can only be one Black List active at a time Consult the section titled Creating a New Black List for information on creating the first Black List Usi...

Страница 32: ...ve executables and or folders to the Active Black List Creating a New Black List Only Anti Executable Administrators and Trusted Users can access the Black List editor To create a new Black List compl...

Страница 33: ...lternatively click My Network Places browse and select a remote workstation Click OK The Building Black List for dialog appears to show the progress The Scan feature searches the selected location and...

Страница 34: ...he existing Black List are merged with the scanned list of files or executables Click Save to save the Black List with the same name Click Save As to save the merged Black List with a different name T...

Страница 35: ...the Black List Scan Destination dialog This will search the selected location for any executables Once the scan has finished the results can be merged into the Black List Individual folders and execu...

Страница 36: ...i Executable Any user not listed by Anti Executable is an external user who is subject to the executable launch limitations specified by the contents of the Active White List If an Anti Executable Adm...

Страница 37: ...strators currently logged in can add other domain users Click on a user name to add it to Anti Executable s list and click OK 4 By default each added user is an Anti Executable Trusted User If the new...

Страница 38: ...ot remove the user s Windows user account the user has now become an external user Enabling Anti Executable Passwords As an added layer of protection Anti Executable can attach a password to each user...

Страница 39: ...Users Tab 39 Anti Executable Standard User Guide...

Страница 40: ...of Anti Executable s presence on a system Stealth Mode gives the option to the Administrator to hide the Anti Executable icon in the Windows system tray prevent the Alert from being displayed and pre...

Страница 41: ...able Administrators can use the Alerts pane to specify the message and an image that appears whenever a user attempts to run an unauthorized executable The following messages can be set White List vio...

Страница 42: ...Anti Executable Standard User Guide 42 Using Anti Executable...

Страница 43: ...43 Anti Executable Standard User Guide Uninstalling Anti Executable This chapter explains the procedure to uninstall Anti Executable Topics Uninstalling using the Setup Wizard...

Страница 44: ...o remove Anti Executable 1 Double click the msi file used to install Anti Executable The Installation Wizard is displayed 2 Click Remove followed by Next 3 Click Remove Anti Executable can only be uni...

Страница 45: ...i Executable Standard User Guide 4 Click Finish to complete the uninstall 5 Following a successful uninstall a restart is required Click Yes to restart immediately or No to restart later An immediate...

Страница 46: ...Anti Executable Standard User Guide 46 Uninstalling Anti Executable...

Отзывы: