Contents
2 Sanctuary Application Control Suite Administrator's Guide v4.0.0
Endpoint Maintenance........................................................................... 36
The Reports menu.................................................................................38
The Explorer menu................................................................................38
The Help menu.....................................................................................39
The six system modules.......................................................................... 39
Chapter 3: An overview of authorization strategies........................... 41
Central authorization by digital signature (hash)............................................... 42
Central authorization by file location (path)..................................................... 43
Authorization for Windows scripts and macros.................................................. 43
To centrally allow or deny authorization for
all
scripts and macros...................44
To grant local users authority to allow or deny scripts and macros ...................44
Local authorization ....................................................................................45
If ‘local authorization’ is allowed .............................................................45
To prevent Users or User Groups from performing local authorization................46
To enable users to locally authorize applications not listed in the Sanctuary
system ...............................................................................................46
To prevent the malicious spread of locally authorized files .............................46
Sending updated authorization information to computers................................... 47
To push updates to all computers protected by Sanctuary............................... 47
To push updates to a designated computer.................................................48
If you do not push updates to computers ...................................................48
Chapter 4: Setting up a Sanctuary system administrator ....................49
Overview -- Types of administrators...............................................................49
How to set up a Sanctuary system administrator ...............................................49
To define a system administrator with full management privileges ..................50
To define a system administrator with restricted access privileges.................... 51
To define access privileges to specific functions and modules.......................... 51
Chapter 5: Building a list of executable files to be managed ..............53
Export file permissions................................................................................54
Importing standard file definitions from SecureWave .........................................55
If you chose the automatic import option during installation..........................56
If you did not import standard file definitions during installation....................56
Selecting executable files from network directories............................................59
Using the EXE Explorer module (no client driver required) ..............................59
Automatically scanning a computer to identify executable files ............................59
Using the Scan Explorer module (requires a client driver) .............................. 60
Using the Authorization Wizard .....................................................................66
To add executables to the Sanctuary database using the Authorization Wizard.... 67
Chapter 6: Organizing files into File Groups .....................................71
Creating and managing File Groups.................................................................71
To create a new File Group.......................................................................71
To delete a File Group ............................................................................ 72
To rename a File Group .......................................................................... 73
To create a parent-child relationship between File Groups ............................. 73
Assigning executable files to File Groups ......................................................... 76
To assign files to File Groups.................................................................... 76
Changing file assignments ........................................................................... 78