Configuring Application Control Rules

If you try to add a rule while configuring the Application Control policy settings, skip to step 3.

  1. Go to POLICIES > Application Control Rules.
  2. Click Add Rule and select a rule type.
  3. Specify a rule name.
  4. Select a match method to identify applications and configure required settings.

    Match Method

    Description

    File or folder paths

    Allows you to apply the rule to any application installed in the specified location

    Click Add to specify file or folder paths.

    Examples:

    C:\Program Files\Skype\Phone\Skype.exe

    C:\Program Files\Adobe

    Note:

    Hash values

    Allows you to apply the rule to applications based on SHA-256 hash values

    In Input method, select from the following:

    • Manual: Click Add to manually specify hash values.

    • Import: Use the Hash Generator tool to create a CSV file containing the hash values of the applications found on the endpoint. You can also create a CSV file using the CSV sample format.

      For more information on using the Hash Generator tool, see Using the Hash Generator Tool.

      Click Select File and follow the on-screen instructions to import your file.

    Certified Safe Software List

    Allows you to apply the rule to applications that Trend Micro has tested

    Click Manage Applications to select the applications. Worry-Free Business Security Services adds the selected applications to the rule and downloads the files that are used to match the selected applications.

    For applications that receive updates frequently, Trend Micro also updates the Trend Micro Certified Safe Software List constantly to provide the latest information. Worry-Free Business Security Services needs to download the files again when the selected applications receive updates. Depending on the number of applications you selected, file downloads might consume your network bandwidth.

    For more information, see Network Bandwidth Consumption Resulted from Certified Safe Software List Updates.

    Gray Software List

    Allows you to apply the rule to applications that Trend Micro has tested and found to be potentially harmful

    Click Manage Applications to select the applications. Worry-Free Business Security Services adds the selected applications to the rule and downloads the files that are used to match the selected applications.

    The Gray Software List contains applications that may be malicious if not used properly. Although not original intent of some of these applications, malware writers sometimes exploit the functionality of certain applications for malicious purposes. Trend Micro recommends testing and planning carefully before blocking applications in the Gray Software List.

  5. Click Save.