Phase 5: Lock Down Endpoints

You are ready to move endpoints into lockdown after the following:

  • You've monitored the logs for the necessary period of time

  • You've created the Trust policies required in your environment

  • The logs have stabilized and you haven't seen any unexpected entries for at least one month

In this phase you will:

  • Communicate with users so that they understand the upcoming changes and how to get assistance. See Appendix 2 for sample end user communications.

  • Conduct a thorough antivirus scan prior to lockdown

  • Lock down endpoints by applying the Easy Lockdown policy

  • Authorize blocked applications when needed

  • Use Local Authorization wisely to provide flexibility

Once endpoints are locked down, the whitelist is enforced. Applications are blocked if they:

  • Are not on the whitelist
  • Are not allowed to execute by a Trusted Change policy

After lockdown, you can manage your Application Control deployment and authorize any blocked applications you want to allow in your environment.