ADComputerGroupMembershipTimeoutSecs |
Numeric |
Timeout, in seconds, for nested computer group lookups. The default setting is 120 seconds and setting this value to 0 disables the timeout. |
ADQueriesEnabled |
Numeric |
This setting controls the types of AD queries used to determine the system's Distinguished Name and computer group membership. A value of 0 disables queries made to AD and the use of computer groups and OU in the configuration. The default value of 1 causes the agent to perform both the Distinguished Name and direct (non-nested) computer group AD queries. Nested computer groups in the configuration are ignored. A value of 2 causes the agent to perform the Distinguished Name, direct and nested computer group AD queries. This setting could cause performance issues on the DC due to high CPU usage. |
AlternateTOCheck |
Numeric |
Trusted Ownership checks have occasionally caused
excessive CPU usage in the SYSTEM process when third party filter
drivers are installed on the system.
Enabling this setting, using a value of 1, causes Application Control
to use an alternative method of looking up Trusted Ownership,
which mitigates this issue in some cases. |
AMFileSystemFilterFailSafe |
Numeric |
This setting configures whether the file system filter driver operates in a Fail Safe or Fail Secure mode. If there is a problem with the Agent and it stops responding, the driver disconnects in Fail Safe mode and does not intercept anymore requests. A value of 1 indicates Fail Safe, 0 indicates Fail Secure. Fail Safe is the default. Changing this setting requires an Agent restart to take effect. |
AppHookDelayLoad |
Text |
This setting causes the AmAppHook Dll to load after a configurable number of milliseconds (ms) delay. This setting is configured on a per filename basis. The format is <filename+extension>,<delay>. The filename and extension can contain wildcards. Each pair is semi colon delimited. For example 'calc.exe,2000;note*.exe,6000' |
AppHookEx |
Text |
Application Control utilizes a Windows hook as
part of the Application Network Access Control (ANAC) feature.
In rare cases, applications can display unexpected behavior when
hooked. This setting is a list of applications in which ANAC specific
functions are not hooked and therefore not subject to the ANAC
rules.
If an application is named in both AppHookEx and
UrmHookEx, the AmAppHook.dll is
not loaded. Multiple entries are delimited by a semi-colon (;). |
AppInitDllPosition |
Numeric |
Use this setting to specify whether the AsModLdr
driver or the Appinit registry key is used to inject the Application Control hook. This setting is also used to determine the position
of AMLdrAppinit.dll in the AppInit_DLL registry value.
Set one of the following values:
This setting should only be used under the guidance of
the Ivanti Support Team. |
baseconfigmergebehavior |
Text |
Use to control whether the new configuration.aamp
replaces or re-merges the existing merged_configuration.aamp.
The accepted values for this setting are replace
and remerge.
When you merge using GPO the Replace
value is ignored and automatically defaults to Remerge. |
BrowserAppStorePort |
Numeric |
Enter the port used to allow the Browser Control
Chrome extension to be installed. |
BrowserCommsPort |
Numeric |
Enter the port used for communications from browser
extensions to the agent. |
BrowserExtensionInstallHive |
Numeric |
This engineering setting allows the administrator to choose which registry hive the Application Control Chrome browser extension will be installed in. Options are:- 0 - Extension not installed
- 1 - Install to HKLM
- 2 - Install to HKCU.
0 is where the administrator must manually configure their own enterprise appstore to deploy the Application Control Chrome Extension. The default behaviour is 2 - for the chrome extension to be installed in HKCU. |
BrowserHookEx |
Text |
The value can be set to 'Chrome.exe' to stop the Application Control browser hook (BrowserHook.dll) from being injected into it. The browser hook prevents all network communications until the Chrome Extension has established a connection with the Application Control Agent. No core functionality is affected by this custom setting. |
BrowserNavigateEx |
Text |
A pipe (|) delimited list of navigation URLs
that bypass the navigate event processing. The URLs in this
list are not subject to URL redirection. |
ComputerOUThrottle |
Numeric |
This setting limits an Active Directory look-up
per connecting client for checking Organizational Unit membership
by limiting the number of concurrent queries. This throttling helps reduce the amount of query-traffic on a domain if handling
a large volume of connecting clients. Set this value between 0 and 65535. |
ConfigFileProtection |
Numeric |
Lock configuration AAMP files and the merged config folder to prevent configurations being updated by unauthorized users. This feature is disabled by default - set to a value to 1 to enable. Care should be taken when applying this setting in test environments - you may not be able to turn it off as your configuration cannot be updated. If this occurs, contact Ivanti Support. |
DFSLinkMatching |
Numeric |
DFS Link paths can be added to the
rules. DFS Links and DFS Targets are treated as separate independent items to
be matched. There is no conversion from Link to Target before applying
the rules. Set this value to 1
to enable DFS Link matching. |
DirectHookNames |
Text |
Application Control's Windows hook
is loaded into all processes that load user32.dll by default. Applications
which do not load this DLL are not hooked. Any applications which
do not load user32.dll should be included in this setting as part of a semi-colon delimited list of full paths or filenames. |
DisableAppV5AppCheck |
Numeric |
By default, any application launched using AppV5 is exempt from Trusted Ownership checking. Use this setting
to disable this behavior with a value of
1. |
DisableCustomRulesPreCheck |
Numeric |
This setting improves the performance of Custom Rules checking by only processing items that are configured within the policies of each custom rule collections. By default this setting is Off and set to '0'. Set the value to '1' to allow all potential requests through the custom rules. |
DisableDNSLookup |
Numeric |
The Application Network Access Control (ANAC) component
is not compatible with all forms of proxy DNS servers. If set to 1, Application Control will not perform DNS lookups, reducing unexpected slowdowns and errors where a proxy DNS server is used. |
DisableSESecondDesktop |
Numeric |
By default, the auditing dialog for Self-Elevation displays on a second desktop. Set to 1 to display the dialog on the primary
desktop. |
DoNotWalkTree |
Numeric |
By default, process rules check the entire parent
key for a match. This setting instructs process rules to only
look at the direct parent of the process and not check the entire
tree. A value of 1 enables this setting. |
DriverHookEx |
Text |
A semi-colon delimited list of applications that will not have the Application Control Hook (AMAppHook.Dll) injected. Application Control requires the hook to be loaded for certain functionality to work. This custom setting should only be used under the guidance of the Ivanti Support Team. |
EnableCustomRulesDllChecking |
Numeric |
By default this setting if off (set to 0) meaning only executables and URLs are processed. This setting improves the performance of Custom Rules checking by controlling whether DLLs are allowed through the rule collections. Set the value to 1 to allow all DLLs to be processed in addition to the default. |
EnableScriptPreCheck |
Numeric |
Whilst scripts within scripted rules are
processing, they are treated as though they have returned a false
value. The length of time scripts take, varies according to
their content. This setting provides the best performance during computer
start-up and user logon because anything depending on the result
of a script is not delayed. Set the value to 1 to make processes wait until the relevant script
has finished.
This can significantly slow down computer start-up and user login. Application Control does not wait indefinitely for scripts results - a 30 second timeout is applied. |
EnableSignatureOptimization |
Numeric |
This setting improves the performance of rules
checking, when using signatures. Files that do not match the full
path are not hashed as it is assumed they are not the same file.
Set to 1 to enable. Enabling this setting and ExtendedAuditInfo will not show any hashed file name in auditing metadata. |
ExplicitShellProgram |
Text |
This setting is used by Application Access Control (AAC). Application Control treats the launch of the shell program (by default explorer.exe)
as the trigger for that session to be considered logged on. Different
environments and technologies can change the shell application
and the agent on occasion can't detect what the shell program
is. Application Control uses the applications in this list
(in addition to the default shell applications) to determine when
a session is deemed to have logged on. This is a semi-colon delimited
list of full paths or filenames. |
ExProcessNames |
Text |
A list of space separated filenames that should
be excluded from the filter driver.
Changing this setting requires an Agent restart to take effect. |
ExtendedAuditInfo |
Numeric |
This setting extends the file information for
audited events. It reports the Secure Hash Algorithm 1 (SHA-1)
hash, file size, file and product version, file description, vendor,
company name, and product name for each file in its audited events.
The information is added immediately after the file name in the
event log. This setting is on by default. To turn it off, enter
a value of 0.
The generation of a hash or checksum is disabled when the
EnableSignatureOptimization
setting is enabled. |
ForestRootDNQuery |
Numeric |
Set the value to 1 to enable the Application Control Agent to perform a forest root query. The query includes chasing referrals to determine the Distinguished Name of connecting devices for the purposes of OU and Computer Group membership in Device Rules. |
ImageHijackDetectionInclude |
Text |
A list of process names against which all child processes are verified to ensure the child image is running without corruption or modification and is a match for the one that was initially requested. If the child process is not verified, it is terminated. This is a semi-colon delimited list of full paths or file names. |
MultipleHostsSameIP |
Numeric |
Allows Application Network Access Control (ANAC) to work with multiple hosts with the same IP Address. It takes out the caching of domain names to IP Addresses and allows different domains to work when running from the same server. Set to a value of 1 to enable. |
NetEnableRevDNS |
Numeric |
Used by Application Network Access Control (ANAC), this setting globally enables a reverse DNS lookup check on each request to access a network resource. Enabling this setting overrides the NetEnabledRevDNSList and RevDNSList settings. Set to a value of 1 to enable. This feature requires the administrator to enable and configure Reverse Lookup Zones on the company's DNS servers. |
NetEnableRevDNSList |
Numeric |
Used by Application Network Access Control (ANAC), this setting enables a reverse DNS lookup check for only the IP addresses listed
in the RevDNSList. This setting must be used in conjunction
with the RevDNSList setting - set to a value of 1 to enable. This feature requires the administrator to enable and configure
Reverse Lookup Zones on the company's DNS servers. |
OwnershipChange |
Numeric |
Application Control detects if a trusted file is changed by a non-trusted owner. In such a case, the file owner is changed to the untrusted user and any execute requests are blocked. Some applications overwrite files in such a way that Application Control does not detect it by default, therefore the owner of the file is not changed. When enabled, Application Control performs additional checks to catch all file changes and overwrites should be caught. Set to a value of 1 to enable. |
PCRRetainOnNewConfig |
Numeric |
Control how Policy Change Requests (PCR) are dealt with when a new configuration is issued. This feature is disabled by default - authorized PCRs are removed upon receipt of a new configuration.
Set a value of 1 to retain authorized Policy Change Requests when a new configuration is issued.
|
RdmHookEx |
Text |
A list of applications, used in Privilege Discovery Mode (PDM), in which PDM specific functions are not hooked by Application Control's Windows hook. The values should be a semi-colon delimited list of filenames. |
RemoveDFSCheckOne |
Numeric |
When files are stored on a DFS drive, the Application Control agent uses a number of strategies to evaluate the correct
UNC path. One of these strategies can cause delays during login
if large numbers of scripts and executables are stored in and
replicated by, Active Directory.
Set to a value of one to enable, causing Application Control to ignore this strategy and increase performance in this situation. |
RevDNSList |
Varies |
This setting is only applicable when used in conjunction with
NetEnableRevDNSList and is used by Application Network Access Control (ANAC).
It contains IP addresses that will have a reverse DNS lookup check. The IP addresses should be in IPv4 dotted decimal format (n.n.n.n) and in a semi-colon delimited list.
This setting requires the administrator to enable and configure
Reverse Lookup Zones on the company's DNS servers. |
SECancelButtonText |
Text |
The text displayed
by the cancel button on the Self-Elevation dialog. |
SelfElevatePropertiesEnabled |
Numeric |
Set this value to '1' to enable self-elevation of properties. This feature is disabled by default. |
SelfElevatePropertiesMenuText |
Text |
The text in the context menu option for self-elevation of properties. |
SEOkButtonText |
Text |
The text displayed
by the OK button on the Self-Elevation dialog. |
TVChecking |
Numeric |
Enabling this setting causes Application Control to ignore Trusted Vendor checking for all files, even if the configuration contains entries for Trusted Vendors. Set to a value of 0 to enable this setting. This setting is Intended for troubleshooting issues. |
UrlRedirectionSecPolicy |
Numeric |
By default, the security policy is ignored by the URL Redirection feature. This engineering setting allows the administrator to force URL Redirection to follow the configured security policy. Set to a value of 1 to enable. Self Authorization is not supported. |
UrmForceMediumIntegrityLevel |
Text |
A User Privilege Management (UPM) custom setting used to override the integrity level when user privileges are elevated applications, which by default sets the integrity level to high. When this setting is used, the level is reduced to medium. This value should be a semi-colon delimited list of file names. |
UrmHookEx |
Text |
Application Control utilizes a Windows hook as
part of the User Privilege Management feature. In rare cases,
applications display unexpected behavior when hooked. This setting
lists the applications where User Privilege Management specific
functions are not hooked.
If an application is named in both AppHookEx and
UrmHookEx, the AmAppHook.dll is
not loaded Multiple entries are delimited by a semi-colon. |
UrmPauseConsoleExit |
Text |
Used by the User Privilege Management feature.
When a console application is elevated, a new application can appear
in a new console window. The application runs to completion
then closes. This is a problem if the user wants to see the output
of the program. This setting causes the application to remain
until a key is pressed. This is a semi-colon delimited list of
full paths or filenames. |
UrmSecPolicy |
Numeric |
By default, the security policy is mostly ignored by the User Privilege Management feature. User Privilege Management rules are applied in all cases except for when Audit Only mode is selected. This custom setting allows administrators to force User Privilege Management to follow the configured security policy. For Unrestricted and Self-Authorize security levels, User Privilege Management rules are not applied. For the Restricted level, User Privilege Management rules are applied. Set to a value of 1 to enable this setting. |