TKM Teknologi

AUTOMATED APLLLICATION PREVENTIVE CONTROLS

  1. Go to End Point Controller
  2. Go to Blocking and Interception

The node Blocking and interception allows configuring rules of access to objects (files, messages, devices, etc.)

  1. Rule allowing/denying access and transfer of files from various applications according to the FileAuditor labels.
  2. Rule allowing/denying transfer of files and/or messages in various messengers.
  3. Rule allowing/denying data printing.
  4. Rule allowing/denying transfer of files and data (according to their content) on websites.
  5. Rule allowing/denying access to websites.
  6. Rule allowing/denying transfer of files on websites over HTTP protocol (Transfer of files over HTTP).
  7. Rule allowing/denying access to Bluetooth devices/services, allowing operations with files over Bluetooth.
  8. Rule allowing/denying access to processes.
  9. Rules allowing/denying operation with network folders and files.
  10. Rules allowing/denying data writing to network folders by content of written data.
  11. Rules allowing/denying transfer of files over FTP.
  12. Rule allowing/denying drag-and-drop operations.
  13. Rule allowing/denying access and operations on USB devices without metadata support.
  14. Rule allowing/denying use of extensions in web browsers.
  15. The settings of rules allow detecting a file:
    1. By its attributes (file name, type, etc.)
    2. By its content
    3. By labels assigned by FileAuditor to scanned files according to the configured rules, as well as by manual labels.

If, in the rule for certain application/user/computer/process, operations are denied, files corresponding to the rules will be locked for opening and sending. The following operations are allowed without processing by rules:

  • Opening of files by the system
  • Creation/overwriting of file at its opening
  • File opening without read rights.

18. Bluetooth devices and services are detected according to their unique ID (UUID – universally unique identifier). If a rule is restrictive, Bluetooth devices/services corresponding to the rule conditions will be blocked.

  1. To activate the feature of blocking, select the checkbox Use blocking rules.
  2. To manage rules, the following buttons are intended:
  3. Rules Wizard (only in the node Blocking and interception): to create a permission rule of access to files via Wizard.
  4. Add: to create a rule of corresponding type.
  5. Modify: to change the selected rule.
  6. Delete: to delete the selected rule.
  7. Export: to open the standard Save as dialog box where you can specify name of the file containing list of exported rules and path to it.
  8. Import: to open the standard Open dialog box where you can select the XML file with rules exported before.
  9. use the search bar to filter available rules by text values in all columns.
  10. Select/unselect rule checkboxes to activate/deactivate rules.

    1. Configured rules are written to the agent configuration file and processed in the order they are listed in the console. If all the rule conditions are met, the rule is activated. Other rules lower in the list with overlapping conditions will not be activated. For example, if you create a first rule which includes a condition to block Zoom calls, and another rule after which allows Zoom calls, Zoom calls will still be blocked according to the first rule in the list.

    1. The rules order within a group is managed with the help of the buttons UP and DOWN . Click the buttons and to move a rule to the very top and bottom correspondingly.