background image

Anti-Executable Standard User Guide

 

8

|

  Preface

Definition of Terms

Term

Definition

Alert

The notification dialog that appears when there is an attempt to launch an 
unauthorized executable. Anti-Executable Administrators can specify the 
message and image displayed in the alerts. For more information, refer to 

Exporting Anti-Executable Configurations

.

Anti-Executable 
Administrator 

Anti-Executable Administrators have access to all Anti-Executable 
configuration options. They can create and edit White Lists, Black Lists, 
manage Anti-Executable users, set Anti-Executable protection to Enabled 
or Disabled, and uninstall/upgrade Anti-Executable.

Anti-Executable 
Console Loadin

A software library that extends the functionality of Faronics Core Console 
allowing full control over the configuration and operation of 
Anti-Executable installed on remote workstations.

Anti-Executable 
Trusted User

Trusted Users have access to Status tab, White Lists tab and Black Lists tab. 
They can create and edit White Lists, Black Lists, and set Anti-Executable 
protection to 

Enable

 or 

Disable

. Trusted Users cannot uninstall/upgrade 

Anti-Executable.

Authorized 
Executable

An Executable that is in the Active White List and therefore can be 
launched. 

Black Folder

A folder, and its sub-folders, from which all executables are blocked. 

Black List

A list of executables, or folders containing executables, that are blocked by 
Anti-Executable. 

Executable

Any file that can be launched by the operating system. The executable files 
managed by Anti-Executable have the extension .

scr

.jar

.bat

, .

com

, or 

.exe

External User

Any user that is neither an Anti-Executable Administrator nor an 
Anti-Executable Trusted user.

An external user can run only authorized executables and has no control 
over Anti-Executable configuration. This restriction applies regardless of 
any user rights assigned by the operating system.

Faronics Core 
Agent

The software installed on workstations to enable communication with 
Faronics Core Console.

Maintenance 
Mode

When in Maintenance Mode, new executable files added or modified are 
automatically added to the Active White List.

Protection

When set to 

Enabled

, this setting indicates that Anti-Executable is 

protecting a computer with an Active White List. When set to Disabled, any 
executable can be launched on the computer. 

Summary of Contents for ANTI-EXECUTABLE STANDARD

Page 1: ...Anti Executable Standard User Guide 1...

Page 2: ...d Faronics Deep Freeze Faronics Core Console Faronics Anti Executable Faronics Device Filter Faronics Power Save Faronics Insight Faronics System Profiler and WINSelect are trademarks and or registere...

Page 3: ...ti Executable Maintenance Mode 24 Exporting Anti Executable Configurations 24 White List Tab 25 Using the White List Editor 25 Creating a New White List 26 Activating a White List 29 Adding Executable...

Page 4: ...Anti Executable Standard User Guide 4 Contents Customizing Alerts 41 Uninstalling Anti Executable 43 Uninstalling using the Setup Wizard 44...

Page 5: ...Anti Executable Standard User Guide 5 Preface Anti Executable protects computers by preventing unauthorized executables from running Topics Important Information Technical Support Definition of Terms...

Page 6: ...technology professionals Fueled by a market centric focus Faronics technology innovations benefit educational institutions health care facilities libraries government organizations and corporations Pr...

Page 7: ...ne 800 943 6422 or 604 637 3333 Hours Monday to Friday 7 00am to 5 00pm Pacific Time Contact Information Web www faronics com Email sales faronics com Phone 800 943 6422 or 604 637 3333 Fax 800 943 64...

Page 8: ...able or Disable Trusted Users cannot uninstall upgrade Anti Executable Authorized Executable An Executable that is in the Active White List and therefore can be launched Black Folder A folder and its...

Page 9: ...en from being displayed Trusted Executable A Trusted executable can launch other executables that themselves are unauthorized Unauthorized Executable An Unauthorized executable is one that is not in t...

Page 10: ...Standard User Guide 10 Introduction Introduction Anti Executable protects computers by preventing unauthorized executables from running Topics Anti Executable Overview System Requirements Anti Execut...

Page 11: ...the protection that you need Choose the Anti Executable edition that bests suits your needs Enterprise versions allow to protect multiple computers from a central console called Faronics Core Console...

Page 12: ...System Requirements Anti Executable can be installed on the following Operating Systems 32 bit edition of Windows XP SP3 and 64 bit edition of Windows XP SP2 32 and 64 bit editions of Windows Server 2...

Page 13: ...version requires a valid License Key in order to protect the machine License information can be obtained by Anti Executable Administrator through the Anti Executable Status tab To upgrade from an Eva...

Page 14: ...Anti Executable Standard User Guide 14 Introduction...

Page 15: ...15 Anti Executable Standard User Guide Installing Anti Executable This chapter describes the installation process of Anti Executable Topics Installation Overview Installing Anti Executable...

Page 16: ...r 2008 Windows XP SP3 and Windows Vista Before installing verify the operating system version and choose the installer from the following list System Install File Windows XP Vista 32 bit AEStd_32 bit...

Page 17: ...nternet double click AEStd_32 bit_en msi for a 32 bit Operating System or AEStd_64 bit_en msi for a 64 bit Operating System to begin the installation process Click Next to continue 2 Read and accept t...

Page 18: ...tall location The default is C Program Files Faronics AE Click Next to continue 5 This step is optional Specify the Anti Executable Administrator and Trusted User passwords These passwords can also be...

Page 19: ...tomatic Scanning and White List Creation dialog is displayed Select Enable if you want Anti Executable to automatically scan all non removable drives on the computer and create a White List Click Inst...

Page 20: ...art is recommended following installation If the Enable check box is selected in the Automatic Scanning and White List Creation dialog Protection is enabled and there is an Active White List when the...

Page 21: ...Using Anti Executable This chapter describes the procedure to access configure and use Anti Executable Topics Accessing Anti Executable Status Tab White List Tab Adding Executables to the Active White...

Page 22: ...ss Anti Executable if those passwords have been set Using Anti Executable Following installation Anti Executable must be configured Anti Executable Administrators can access all the following tabs Sta...

Page 23: ...Click Update for more information If an Evaluation version of Anti Executable has been installed the Valid until field displays the date when Anti Executable expires Anti Executable displays a notific...

Page 24: ...tions Anti Executable Administrators can save multiple configurations which can be applied to other machines If a White List has been set as Active it is also included in the configuration export To s...

Page 25: ...rs from which any executable can be launched There can only be one White List active at a time Refer to the section titled Creating a New White List for information on creating the first White List Us...

Page 26: ...White List complete the following steps 1 Shift double click the Anti Executable icon in the System Tray Alternatively you can also use the Ctrl Alt Shift F10 hotkey Specify the Administrator passwor...

Page 27: ...on locally Click My Network Places browse and select a remote workstation for remote scanning The Scan feature searches the selected location and its sub directories for any executable files files con...

Page 28: ...List are merged with the scanned list of files or executables Click Save to save the White List with the same name Click Save As to save the merged White List with a different name To search for a pa...

Page 29: ...n existing White List This location can be local external or on a network Click Scan to launch the White List Scan Destination dialog This will search the selected location for any executables Once th...

Page 30: ...Active White List The next time the executable is launched it will be blocked again Deny The executable is not added to the Active White List and remains an unauthorized executable It is not permitte...

Page 31: ...lders from which all executables are blocked There can only be one Black List active at a time Consult the section titled Creating a New Black List for information on creating the first Black List Usi...

Page 32: ...ve executables and or folders to the Active Black List Creating a New Black List Only Anti Executable Administrators and Trusted Users can access the Black List editor To create a new Black List compl...

Page 33: ...lternatively click My Network Places browse and select a remote workstation Click OK The Building Black List for dialog appears to show the progress The Scan feature searches the selected location and...

Page 34: ...he existing Black List are merged with the scanned list of files or executables Click Save to save the Black List with the same name Click Save As to save the merged Black List with a different name T...

Page 35: ...the Black List Scan Destination dialog This will search the selected location for any executables Once the scan has finished the results can be merged into the Black List Individual folders and execu...

Page 36: ...i Executable Any user not listed by Anti Executable is an external user who is subject to the executable launch limitations specified by the contents of the Active White List If an Anti Executable Adm...

Page 37: ...strators currently logged in can add other domain users Click on a user name to add it to Anti Executable s list and click OK 4 By default each added user is an Anti Executable Trusted User If the new...

Page 38: ...ot remove the user s Windows user account the user has now become an external user Enabling Anti Executable Passwords As an added layer of protection Anti Executable can attach a password to each user...

Page 39: ...Users Tab 39 Anti Executable Standard User Guide...

Page 40: ...of Anti Executable s presence on a system Stealth Mode gives the option to the Administrator to hide the Anti Executable icon in the Windows system tray prevent the Alert from being displayed and pre...

Page 41: ...able Administrators can use the Alerts pane to specify the message and an image that appears whenever a user attempts to run an unauthorized executable The following messages can be set White List vio...

Page 42: ...Anti Executable Standard User Guide 42 Using Anti Executable...

Page 43: ...43 Anti Executable Standard User Guide Uninstalling Anti Executable This chapter explains the procedure to uninstall Anti Executable Topics Uninstalling using the Setup Wizard...

Page 44: ...o remove Anti Executable 1 Double click the msi file used to install Anti Executable The Installation Wizard is displayed 2 Click Remove followed by Next 3 Click Remove Anti Executable can only be uni...

Page 45: ...i Executable Standard User Guide 4 Click Finish to complete the uninstall 5 Following a successful uninstall a restart is required Click Yes to restart immediately or No to restart later An immediate...

Page 46: ...Anti Executable Standard User Guide 46 Uninstalling Anti Executable...

Reviews: