Copyright Notice
This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates (referred to collectively as “Ivanti”), and may not be disclosed or copied without prior written consent of Ivanti.
Ivanti retains the right to make changes to this document or related product specifications and descriptions, at any time, without notice. Ivanti makes no warranty for the use of this document and assumes no responsibility for any errors that can appear in the document nor does it make a commitment to update the information contained herein. For the most current product information, please visit www.ivanti.com.
Copyright © 2003-2021, Ivanti. All rights reserved.
Ivanti and its logos are registered trademarks or trademarks of Ivanti, Inc. and its affiliates in the United States and/or other countries. Other brands and names may be claimed as the property of others.
Table of Contents
What's new in Application Control? |
|
Product Overview |
|
Product Architecture |
|
Application Control Console |
|
Application Control Security Methods |
|
Application Control for Linux |
|
Administration |
|
Applying Rule Sets |
|
Deployment Notes |
|
Configuration |
|
Maintenance |
|
Licensing |
|
Service Packs |
|
Telemetry |
|
About Configurations |
|
Maintain Configurations |
|
Global Settings |
|
Trusted Owners |
|
Extension Filtering |
|
Application Termination |
|
Message Settings |
|
Archiving |
|
Policy Change Request |
|
Help Desk Portal |
|
Manage |
|
Advanced Settings |
|
Signature Hashing |
|
Auditing |
|
Configuration Profiler |
|
Configuration Change Tracking |
|
Privilege Discovery Mode |
|
Web Services Configuration |
|
Privilege Discovery Results |
|
Group Management |
|
Rules |
|
Group Rules |
|
User Rules |
|
Device Rules |
|
Custom Rules |
|
Scripted Rules |
|
Process Rules |
|
Rules Options |
|
Allowed Items |
|
Denied Items |
|
Trusted Vendors |
|
User Privilege Rules |
|
UAC Replacement |
|
Browser Control |
|
Snippets |
|
Rule Items |
|
Condition Management |
|
Control Applications |
|
Use Process Rules to Restrict Access to FTP |
|
Wildcards and Regular Expressions |
|
Rules Examples |
|
User Privileges |
|
Privilege Management |
|
User Privilege Management Use Cases |
|
Components |
|
Self-Elevation |
|
System Controls |
|
Elevate a Group to Allow Microsoft OneDrive to be Uninstalled |
|
Prevent the Windows Firewall Service from Being Stopped |
|
Prevent the System Log from being cleared |
|
Application Network Access Control |
|
Endpoint Configuration Merging |
|
Event Viewer |
|
Endpoint Analysis |
|
Rules Analyzer |
|
Sample Scripts |
|
Script Sample: Create UPM Policies |
|
Script Sample: Add User Privileges Component |
|
Script Sample: Edit User Privileges Component |
|
Configuration Object |
|
Configuration Helper Object |
|
Importing and Exporting Scripted Rules |
|
Citrix XenApp |
|
App-V5.0 Support |
|