Trusted Change Policies

Ivanti Application Control provides four Trusted Change policies which allow non-whitelisted applications to execute. This reduces the administrative burden of maintaining the network after application control is enforced.

Trusted Updater: Trusted Updater allows an application to run and to add or update files on an endpoint. Files added or updated can also run because they are added to the whitelist. This is the only Trusted Change policy that can add files to an endpoint's whitelist. See Working with Trusted Updater

Trusted Publisher: Trusted Publisher is a trusted source that digitally signs files and applications through a certificate so that executables are allowed to run on endpoints without each file/application having to be authorized independently. See Working with Trusted Publisher.

Trusted Path: Trusted Path is a file system path configured so that any executable files it contains can be run by all users/endpoints that have been assigned the Trusted Path policy. See Working with Trusted Path.

Local Authorization: Local Authorization is a policy that allows a specified user to authorize an application that is not on a whitelist or permitted by another trust mechanism. See Working with Local Authorization.

Logging Trusted Change Policies

Logging options selected in Easy Auditor and Easy Lockdown policies can determine the logging behavior of trusted change policies.

Trusted Path is the only trusted change policy with its own logging options. But Trusted Updater and Trusted Publisher events can be logged by setting Easy Auditor/Easy Lockdown logging options.

The logging options set on Easy Lockdown and Easy Auditor policies have the following effect on trusted change policies:

Log non-authorized applications option

Trusted Updater

Logs when applications are added to the whitelist by Trusted Updater.

Trusted Publisher

No effect

Trusted Path

No effect

Log authorized applications option

Trusted Updater

Logs when applications are added to the whitelist by Trusted Updater.

Logs when applications whitelisted by Trusted Updater are allowed to run.

Trusted Publisher

Logs when applications are allowed to run by Trusted Publisher policies.

Trusted Path

Logs when applications are allowed to run by Trusted Path policies. This overrides the setting in the Trusted Path policy.

Include all details on authorized applications option

Trusted Updater

No effect

Trusted Publisher

No effect

Trusted Path

Detailed information on applications allowed to run by the Trusted Path policy is logged (every executable file and library loaded will be logged). This overrides the setting in the Trusted Path policy.

Unassigning Multiple Policies

You can unassign multiple application control policies at the same time, removing the association between them and their assigned endpoints and users. Policies that are no longer assigned to an endpoint remain in the system as unassigned policies, which you can re-assign at a later time.

  1. Select Manage > Application Control Policies.
  2. Click either the Managed Policies tab or the Trusted Change tab.
  3. Select all the policies you want to unassign on that page.
  4. You can select any combination of the policy types available on the page.

    The selected policies are highlighted.

  5. Click Unassign.
    The Unassign Policy confirmation dialog is displayed.
  6. Review the policies to be unassigned. If necessary, click a chevron (>) to expand the display of the endpoints and users that a policy is assigned to.
  7. Click Yes.
    The application control policies are unassigned.