124 K
aspersky Internet Security 6.0
specify whether to log component activity in the component report. The default
settings allow most critical operations are allowed to start, be edited, or be
started as child processes.
To add an application to the critical application list and create a rule for it:
1. Click
Add
on the
Critical applications
tab. A context menu will open:
click
Browse
to open the standard file selection window, or click
Applications
to see a list of currently active applications and select one
of them as necessary. The new application will be added to the top of
the list, and
allow
rules (i.e. all activities are allowed) will be created for
it by default. When that application is first started, the modules that it
accesses will be added to the list, and those modules will similarly be
given
allow
rules.
Figure 35. Configuring Application Integrity Control
2. Select a rule on the list and assign rule settings in the lower portion of
the tab:
•
Define the Proactive Defense response to attempts to execute
the critical application, change its makeup, or start it as a child
process.