Contents
2 Sanctuary's Quick Setup and Configuration Guide 4.2.2
Scheduled permissions ................................................................................................ 35
CD authorization .......................................................................................................... 36
Shadowing ................................................................................................................... 37
Auditing ....................................................................................................................... 38
Reporting ..................................................................................................................... 38
Summary ..................................................................................................................... 39
Chapter 4: Testing your Sanctuary Application Control Suite
installation ................................................................................................ 41
Performing an initial scan ............................................................................................. 41
Creating a Scan Template ..................................................................................... 42
Utilizing your new template .................................................................................... 42
Authorizing your new file hashes ........................................................................... 43
Authorizing Files .......................................................................................................... 43
Try to log on a machine with the client installed ........................................................... 45
Auditing ....................................................................................................................... 45
Log Explorer .......................................................................................................... 46
Database Exploration .................................................................................................. 47
Local Authorization ...................................................................................................... 48
Chapter 5: Practical setup examples ....................................................... 51
Assigning permissions to groups instead of users ........................................................ 51
Sanctuary Device Control ............................................................................................ 52
DVD/CD burner permissions assignments ............................................................. 52
Removable permissions assignments .................................................................... 53
Shadowing notes ................................................................................................... 54
Sanctuary Application Control Suite ............................................................................. 54
Sanctuary in an organization-wide strategy ........................................................... 54
Setting up your new Sanctuary solution ................................................................. 55
Routine system administration ............................................................................... 56
Verifying new software .......................................................................................... 56
Tips for maximum security ..................................................................................... 57
Appendix A: Troubleshooting ................................................................... 59
Contacting SecureWave Support ................................................................................. 59
Troubleshooting Tips ................................................................................................... 59
SecureWave Sanctuary Database backup ................................................................... 62
SecureWave Application Server backup ...................................................................... 62
Other common issues .................................................................................................. 63
Appendix B: Detailed System Requirements and Limitations ................. 67
System requirements ................................................................................................... 67
Sanctuary Device Control ............................................................................................ 70
Terminal services limitations .................................................................................. 70
The RunAs command limitations ........................................................................... 70