Примеры использования Allowing rules на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Kaspersky Security 10.1 for Windows Server does not create allowing rules for applications launched on excluded servers.
Before starting the generation of the allowing rules basing on the applications launched on a template machine,
Thus, for example, at the High Security level, all network activity not covered by allowing rules, is blocked.
Lists contained in XML files can only be used to create Applications Launch Control allowing rules.
The application will subsequently allow start of programs for which allowing rules were automatically generated.
if there are no allowing rules for such devices.
If the check box is cleared, Kaspersky Security 10.1 for Windows Server only considers the allowing rules for the command line launch.
To avoid launch denying of important applications you need to create allowing rules for them.
If the check box is selected, Kaspersky Security 10.1 for Windows Server exports the allowing rules to the file specified in the field below on completion of the Rule Generator for Applications Launch Control task.
In the Settings section, you can specify actions to perform while creating allowing rules for applications launch control.
Allowing rules are added to the list of the Applications Launch Control task rules;
outgoing network traffic using allowing rules forcibly applied to the Windows Firewall during task execution.
This mode may lead to slow reaction time in network applications since allowing rules have higher priority than stealth mode stealth mode allows only the network activity initiated from your computer.
you are unable to create a common list of rules using a task to automatically generate allowing rules based on applications installed on the reference machine.
are currently connected to a protected computer and generates allowing rules list basing on system data for detected devices.
blocks their usage as mass storages if there are no allowing rules for such devices.
are currently connected to a protected server and generates allowing rules list basing on system data for detected devices.
blocks the use of all devices according to the Default Deny principle and specified allowing rules.
blocks the use of all devices according to the Default Deny principle and specified allowing rules.
This scenario is recommended to generate allowing rules list before the first start of the Device Control task, so that allowing rules generated cover all trusted external devices that are used on a protected server.