background image

 

White List Tab

|

29

 

 Anti-Executable Standard User Guide

8. Click 

Save 

to save the White List. Click 

Save As

 to save under a different name. White Lists are 

saved in a proprietary format with the extension 

.aewl

. Click 

Export

 to export a White List to 

XML or CSV format. White Lists in XML or CSV format can be opened and edited through 
Windows Explorer but can not be set as the Active White List.

Activating a White List

After a White List has been created, it can be set as the Active White List by clicking the 

Browse

 

button in the 

Active White List

 section of the 

White List

 tab. The browse button launches an 

Open

 

dialog. Browse to the White List and click 

Open

.

Adding Executables or Folders to an Existing White List using the White List 

Editor

In addition to populating a new White List, the Scan feature allows executables from a specific 
location to be added to an existing White List. This location can be local, external, or on a network.

Click 

Scan

 to launch the 

White List Scan Destination

 dialog. This will search the selected 

location for any executables. Once the scan has finished, the results can be merged into the 
White List.

Individual folders and executables can be added by clicking 

Add

.

To open a previously created White List, click 

Open

 and browse to the White List file. Make 

any changes necessary with 

Add

Remove, Scan, 

or

 Merge 

buttons. These buttons add and 

remove executables and folders from the White List. They do not modify actual files or folders 
on the machine.

Click  the 

White List Only

 button to delete the executables from the Black List and ensure that 

they are a part of only the White List.

Multiple White Lists can be opened and edited at the same time. Only one White List can be set 
as an Active White List at a time.

For more information about an executable, right-click the executable and select 

Google Search

. The default browser is launched and the name of the executable is 

searched on www.google.com. 

Содержание ANTI-EXECUTABLE STANDARD

Страница 1: ...Anti Executable Standard User Guide 1...

Страница 2: ...d Faronics Deep Freeze Faronics Core Console Faronics Anti Executable Faronics Device Filter Faronics Power Save Faronics Insight Faronics System Profiler and WINSelect are trademarks and or registere...

Страница 3: ...ti Executable Maintenance Mode 24 Exporting Anti Executable Configurations 24 White List Tab 25 Using the White List Editor 25 Creating a New White List 26 Activating a White List 29 Adding Executable...

Страница 4: ...Anti Executable Standard User Guide 4 Contents Customizing Alerts 41 Uninstalling Anti Executable 43 Uninstalling using the Setup Wizard 44...

Страница 5: ...Anti Executable Standard User Guide 5 Preface Anti Executable protects computers by preventing unauthorized executables from running Topics Important Information Technical Support Definition of Terms...

Страница 6: ...technology professionals Fueled by a market centric focus Faronics technology innovations benefit educational institutions health care facilities libraries government organizations and corporations Pr...

Страница 7: ...ne 800 943 6422 or 604 637 3333 Hours Monday to Friday 7 00am to 5 00pm Pacific Time Contact Information Web www faronics com Email sales faronics com Phone 800 943 6422 or 604 637 3333 Fax 800 943 64...

Страница 8: ...able or Disable Trusted Users cannot uninstall upgrade Anti Executable Authorized Executable An Executable that is in the Active White List and therefore can be launched Black Folder A folder and its...

Страница 9: ...en from being displayed Trusted Executable A Trusted executable can launch other executables that themselves are unauthorized Unauthorized Executable An Unauthorized executable is one that is not in t...

Страница 10: ...Standard User Guide 10 Introduction Introduction Anti Executable protects computers by preventing unauthorized executables from running Topics Anti Executable Overview System Requirements Anti Execut...

Страница 11: ...the protection that you need Choose the Anti Executable edition that bests suits your needs Enterprise versions allow to protect multiple computers from a central console called Faronics Core Console...

Страница 12: ...System Requirements Anti Executable can be installed on the following Operating Systems 32 bit edition of Windows XP SP3 and 64 bit edition of Windows XP SP2 32 and 64 bit editions of Windows Server 2...

Страница 13: ...version requires a valid License Key in order to protect the machine License information can be obtained by Anti Executable Administrator through the Anti Executable Status tab To upgrade from an Eva...

Страница 14: ...Anti Executable Standard User Guide 14 Introduction...

Страница 15: ...15 Anti Executable Standard User Guide Installing Anti Executable This chapter describes the installation process of Anti Executable Topics Installation Overview Installing Anti Executable...

Страница 16: ...r 2008 Windows XP SP3 and Windows Vista Before installing verify the operating system version and choose the installer from the following list System Install File Windows XP Vista 32 bit AEStd_32 bit...

Страница 17: ...nternet double click AEStd_32 bit_en msi for a 32 bit Operating System or AEStd_64 bit_en msi for a 64 bit Operating System to begin the installation process Click Next to continue 2 Read and accept t...

Страница 18: ...tall location The default is C Program Files Faronics AE Click Next to continue 5 This step is optional Specify the Anti Executable Administrator and Trusted User passwords These passwords can also be...

Страница 19: ...tomatic Scanning and White List Creation dialog is displayed Select Enable if you want Anti Executable to automatically scan all non removable drives on the computer and create a White List Click Inst...

Страница 20: ...art is recommended following installation If the Enable check box is selected in the Automatic Scanning and White List Creation dialog Protection is enabled and there is an Active White List when the...

Страница 21: ...Using Anti Executable This chapter describes the procedure to access configure and use Anti Executable Topics Accessing Anti Executable Status Tab White List Tab Adding Executables to the Active White...

Страница 22: ...ss Anti Executable if those passwords have been set Using Anti Executable Following installation Anti Executable must be configured Anti Executable Administrators can access all the following tabs Sta...

Страница 23: ...Click Update for more information If an Evaluation version of Anti Executable has been installed the Valid until field displays the date when Anti Executable expires Anti Executable displays a notific...

Страница 24: ...tions Anti Executable Administrators can save multiple configurations which can be applied to other machines If a White List has been set as Active it is also included in the configuration export To s...

Страница 25: ...rs from which any executable can be launched There can only be one White List active at a time Refer to the section titled Creating a New White List for information on creating the first White List Us...

Страница 26: ...White List complete the following steps 1 Shift double click the Anti Executable icon in the System Tray Alternatively you can also use the Ctrl Alt Shift F10 hotkey Specify the Administrator passwor...

Страница 27: ...on locally Click My Network Places browse and select a remote workstation for remote scanning The Scan feature searches the selected location and its sub directories for any executable files files con...

Страница 28: ...List are merged with the scanned list of files or executables Click Save to save the White List with the same name Click Save As to save the merged White List with a different name To search for a pa...

Страница 29: ...n existing White List This location can be local external or on a network Click Scan to launch the White List Scan Destination dialog This will search the selected location for any executables Once th...

Страница 30: ...Active White List The next time the executable is launched it will be blocked again Deny The executable is not added to the Active White List and remains an unauthorized executable It is not permitte...

Страница 31: ...lders from which all executables are blocked There can only be one Black List active at a time Consult the section titled Creating a New Black List for information on creating the first Black List Usi...

Страница 32: ...ve executables and or folders to the Active Black List Creating a New Black List Only Anti Executable Administrators and Trusted Users can access the Black List editor To create a new Black List compl...

Страница 33: ...lternatively click My Network Places browse and select a remote workstation Click OK The Building Black List for dialog appears to show the progress The Scan feature searches the selected location and...

Страница 34: ...he existing Black List are merged with the scanned list of files or executables Click Save to save the Black List with the same name Click Save As to save the merged Black List with a different name T...

Страница 35: ...the Black List Scan Destination dialog This will search the selected location for any executables Once the scan has finished the results can be merged into the Black List Individual folders and execu...

Страница 36: ...i Executable Any user not listed by Anti Executable is an external user who is subject to the executable launch limitations specified by the contents of the Active White List If an Anti Executable Adm...

Страница 37: ...strators currently logged in can add other domain users Click on a user name to add it to Anti Executable s list and click OK 4 By default each added user is an Anti Executable Trusted User If the new...

Страница 38: ...ot remove the user s Windows user account the user has now become an external user Enabling Anti Executable Passwords As an added layer of protection Anti Executable can attach a password to each user...

Страница 39: ...Users Tab 39 Anti Executable Standard User Guide...

Страница 40: ...of Anti Executable s presence on a system Stealth Mode gives the option to the Administrator to hide the Anti Executable icon in the Windows system tray prevent the Alert from being displayed and pre...

Страница 41: ...able Administrators can use the Alerts pane to specify the message and an image that appears whenever a user attempts to run an unauthorized executable The following messages can be set White List vio...

Страница 42: ...Anti Executable Standard User Guide 42 Using Anti Executable...

Страница 43: ...43 Anti Executable Standard User Guide Uninstalling Anti Executable This chapter explains the procedure to uninstall Anti Executable Topics Uninstalling using the Setup Wizard...

Страница 44: ...o remove Anti Executable 1 Double click the msi file used to install Anti Executable The Installation Wizard is displayed 2 Click Remove followed by Next 3 Click Remove Anti Executable can only be uni...

Страница 45: ...i Executable Standard User Guide 4 Click Finish to complete the uninstall 5 Following a successful uninstall a restart is required Click Yes to restart immediately or No to restart later An immediate...

Страница 46: ...Anti Executable Standard User Guide 46 Uninstalling Anti Executable...

Отзывы: