Javascript must be enabled to download our products and perform other essential functions on the website.

ionicons-v5-m
ionicons-v5-j
Buy Now Download Free Trial
ionicons-v5-m
ionicons-v5-f
This is a version 9 feature which is now in BETA.

Trusted Applications

Making sure that only safe and vetted applications run is one of the best ways to secure servers and endpoints from many kinds of malware. This feature is sometimes called application whitelisting, application allow listing or even application locker. We call it Trusted Applications.

With the Trusted Applications feature, you define rules about which processes can be run, by whom, and even which files can be read by those applications (to optionally allow scripts to run in very specific situations you might have).

The rules can take into account:

  • Path of file/executable being accessed
  • Path of process accessing the file/executable
  • Digital signer or the file and/or process
  • User account making the request
  • User's membership groups
  • File, user or digital signer in various lists

The rules are easy to write because they can refer to various lists of files, folders, product companies (application signers), users, etc. Just a few rules can quickly create a large amount of safety for many systems.

Handling the exceptional cases is easy too (example: it's simple to add the one-off application that needs to run in the Finance department).

Trusted Applications rules can be used on servers, as well as client computers via the optional Endpoint.

That fixed the issue. Thanks!!! Awesome response time by the way :)

Todd E., Orion Advisor Technology, USA ionicons-v5-b