Application control is a premium feature that strengthens your protection for the installation and launch of applications, installers, and scripts. Predefined rules designed by F-Secure security experts block many of the common attack vectors of existing malware. In Application control, you can also add your own rules by selecting Add exclusion.
With malware exploits using MS Office vulnerabilities on the rise, it is becoming more common that malware of this type is being spread via documents arriving into a company network. Once the malware gets in, it can set itself up on the victim host and may also launch a new process, such as a PowerShell scripting engine.
As an admin, you can therefore increase the security of your organization and block Microsoft Office programs from starting other apps. This type of restriction does not affect a normal user's work, as Microsoft Office applications do not usually start other apps.
%Program files%environment variable. Application control supports system and user environment variables.
Note: To block any application from starting in MS Office, remove the second parameter.
As powershell.exe is commonly used to configure workstation settings
- if needed, you can then create an additional rule that disables the
powershell.exe restriction, but allows only your own personal scripts. In the
screenshot, we assume that your management scripts are stored under
The exclusion rule explicitly allows powershell.exe, if its condition
Note: The exclusion rule uses the "contains" condition to match paths, such as:
This condition may accidentally match the
An alternative option is to specify the exact match with the "equal to value" as in:
or use the "ends with" condition.
Application control can also help with blocking unwanted applications; for example, games. The following example shows how to block the installation of Steam games.
This rule is specified for MSI installers and blocks by installer subject, which is found in the Properties file:
Application control allows you to specify rules for different meta properties of an application. The following example demonstrates blocking Spotify by copyright text:
This rule blocks Spotify from starting regardless of where the file is installed. These properties are visible in the file details:
Application control is useful for restricting vulnerable applications from running, for example, to block an unpatched version. As an example, CCleaner has fixed a critical vulnerability in the latest version 184.108.40.20699 and any older versions can be blocked.
The condition for the target file version 'is less or equal to 5.41.*.*' The asterisk field indicates that only major and minor fields are used in comparison. As "CCleaner" is in the Target file description, the program is blocked regardless of the file name or its location.
Tip: To find the file version, check the Properties file.