In the Kaspersky Security Center Administration Console tree, expand the Managed devices node.
Select the administration group for which you want to configure the task.
Select the Policies tab.
Double-click the policy name you want to configure.
In the policy properties window, go to the Local activity control section.
In the Applications Launch Control block, click the Settings button.
The Applications Launch Control window opens on the General tab.
Select the Rules tab.
In the Rule usage drop-down list, select the rule application mode:
Add policy rules to the local rules. The application applies the rule list specified in a policy together with local rule lists.
Replace local rules with policy rules. The application applies the rule list specified in the policy for application launch control on a group of protected devices. Local rule lists cannot be created, edited, or applied.
If this functionality is enabled, the application does not allow editing Applications Launch Control rules locally in the Application Console. This option is disabled by default.
If this functionality is enabled, the application does not allow editing Applications Launch Control rules locally in the Application Console. This option is disabled by default.
Add Applications Launch Control rules in any of the following ways:
If necessary, in the Description field, enter a description of the rule.
In the Type drop-down list, select the rule type:
Allowing if you want the rule to allow running applications described by the rule.
Denying if you want the rule to block the launch of applications described by the rule.
In the Scope drop-down list, select the type of files whose execution will be controlled by the rule:
Executable files, if you want the rule to control launch of executable files.
Scripts and MSI packages, if you want the rule to control launch of scripts and MSI packages. Files with the following extensions are supported: .js, .vbs, .cmd, .bat, .py, .ps1, .pl, .msi, .msp, .mst, .com, .vbe, .jse, .psd1, .psm1, .pyd, .pyc, .pm, .hta, .chm, .wsf, .wsc, .wsh, .sct.
Select the Trusted Updaters check box if you want Kaspersky Embedded Systems Security to consider applications matching the rule trigger conditions as trusted updaters. Trusted Updaters are applications that are allowed to create other executable files that will be allowed to run subsequently.
If an application triggers multiple rules, Kaspersky Embedded Systems Security sets the Trusted Updaters flag if the following conditions are satisfied:
All rules allow the application to run.
At least one rule has the Trusted Updaters check box selected.
In the context menu of the button, select the Import → From XML file item.
Choose how to add Device Control rules from an XML file to those available in the policy:
Replace existing rules, if you want to replace the existing rules with the imported rules.
Add to existing rules, if you want to add the imported rules to the list of existing rules. Rules with identical settings are duplicated.
Merge with existing rules, if you want to add the imported rules to the list of existing rules. Rules with identical settings are not duplicated. If at least one rule setting is unique, the rule is added.
In the context menu of the button, select the Import → Create allowing rules based on Kaspersky Security Center events (request) item.
Select the principle for adding the rules to the list of previously created Application Launch Control rules:
Add to existing rules, if you want to add the imported rules to the list of existing rules. Rules with identical settings are duplicated.
Replace existing rules, if you want to replace the existing rules with the imported rules.
Merge with existing rules, if you want to add the imported rules to the list of existing rules. Rules with identical settings are not added; the rule is added if at least one rule parameter is unique.
The Applications launch control rules generation window opens.
Select the event types based on which the application will create Applications Launch Control rules:
Application launch denied.
Statistics only mode: application launch denied.
Select a period from the Request events that were generated within the period drop-down list.
If the check box is selected, Kaspersky Embedded Systems Security uses the checksum of the file to generate the rule when both the checksum and the certificate of the file are available.
If the check box is cleared, Kaspersky Embedded Systems Security uses the digital certificate of the file to generate the rule when both the checksum and the certificate of the file are available.
In the Kaspersky Security Center Administration Console tree, expand the Managed devices node.
Select the administration group for which you want to configure the task.
Select the Policies tab.
Double-click the policy name you want to configure.
In the policy properties window, go to the Logs and notifications section.
In the Task logs block, click the Settings button.
The Notifications window opens.
Expand the Local activity control node.
Select the Applications Launch Control section.
In the list of Applications Launch Control events, in the Send events to Kaspersky Security Center column, select check boxes next to Application startup prohibited and Application startup prohibited in test mode.
Save your changes.
In the Event configuration section of the policy, make sure that the event storage duration specified in the Store in the Administration Server database for (days) field is greater than the period for which you plan to gather information about prevented application launches (the default is 30 days).
Once the Applications Launch Control task log retention period expires, logged events will be deleted and will not appear in the report.
Activate the policy configured to collect data about denied application launches.
If required, modify the Applications Launch Control mode.
When the period for gathering information about prevented application launches expires, make a selection from Application startup prohibited and Application startup prohibited in test mode events and export it to a TXT file. For details, refer to the "Event selections" section in the Kaspersky Security Center Help.
Open the exported TXT file.
If necessary, edit the list of events.
Before importing the blocked applications data, make sure that the list you are importing contains only applications that you want to allow, and nothing else.
In the context menu of the button, select the Import → Create allowing rules based on TXT file with selected Kaspersky Security Center events item.
Choose how to add Applications Launch Control rules from a report to the list of rules already available in the policy:
Merge with existing rules, if you want to add the imported rules to the list of existing rules. Rules with identical settings are not duplicated. If at least one rule setting is unique, the rule is added.
Add to existing rules, if you want to add the imported rules to the list of existing rules. Rules with identical settings are duplicated.
Replace existing rules, if you want to replace the existing rules with the imported rules.
If necessary, in the Description field, enter a description of the rule.
In the Type drop-down list, select the rule type:
Allowing if you want the rule to allow running applications described by the rule.
Denying if you want the rule to block the launch of applications described by the rule.
In the Scope drop-down list, select the type of files whose execution will be controlled by the rule:
Executable files, if you want the rule to control launch of executable files.
Scripts and MSI packages, if you want the rule to control launch of scripts and MSI packages. Files with the following extensions are supported: .js, .vbs, .cmd, .bat, .py, .ps1, .pl, .msi, .msp, .mst, .com, .vbe, .jse, .psd1, .psm1, .pyd, .pyc, .pm, .hta, .chm, .wsf, .wsc, .wsh, .sct.
Select the Trusted Updaters check box if you want Kaspersky Embedded Systems Security to consider applications matching the rule trigger conditions as trusted updaters. Trusted Updaters are applications that are allowed to create other executable files that will be allowed to run subsequently.
If an application triggers multiple rules, Kaspersky Embedded Systems Security sets the Trusted Updaters flag if the following conditions are satisfied:
All rules allow the application to run.
At least one rule has the Trusted Updaters check box selected.
In the context menu of the button, select the Import → From XML file item.
Choose how to add Device Control rules from an XML file to those available in the policy:
Replace existing rules, if you want to replace the existing rules with the imported rules.
Add to existing rules, if you want to add the imported rules to the list of existing rules. Rules with identical settings are duplicated.
Merge with existing rules, if you want to add the imported rules to the list of existing rules. Rules with identical settings are not duplicated. If at least one rule setting is unique, the rule is added.
In the main window of the Web Console, select Assets (Devices) → Policies & profiles.
Click the name of the Kaspersky Embedded Systems Security policy.
The policy properties window opens.
Select the Application settings tab.
Select the Local activity control section.
In the Applications Launch Control block, click the Configure button.
The Applications Launch Control window opens on the General tab.
Select the Rules tab.
In the Application of rules drop-down list, select the rule application mode:
Add policy rules to the local rules. The application applies the rule list specified in a policy together with local rule lists.
Replace local rules with policy rules. The application applies the rule list specified in the policy for application launch control on a group of protected devices. Local rule lists cannot be created, edited, or applied.
If necessary, enable the Deny modification of local rules by users functionality.
Add Applications Launch Control rules in any of the following ways:
Allowing if you want the rule to allow running applications described by the rule.
Denying if you want the rule to block the launch of applications described by the rule.
In the Scope drop-down list, select the type of files whose execution will be controlled by the rule:
Executable files, if you want the rule to control launch of executable files.
Scripts and MSI packages, if you want the rule to control launch of scripts and MSI packages.
Select the Deny for other users check box if you want the application to block the launch of the applications described by the rule for all users that are not listed on the User or group tab.
Select the Trusted Updaters check box if you want Kaspersky Embedded Systems Security to consider applications matching the rule trigger conditions as trusted updaters. Trusted Updaters are applications that are allowed to create other executable files that will be allowed to run subsequently.
If an application triggers multiple rules, Kaspersky Embedded Systems Security sets the Trusted Updaters flag if the following conditions are satisfied:
All rules allow the application to run.
At least one rule has the Trusted Updaters check box selected.
Imported Applications Launch Control rules are added to the list of existing rules. Rules with identical settings are not duplicated. If at least one rule setting is unique, the rule is added.
In the displayed Import from file window, click the Select button.
Specify the path to the XML file with Applications Launch Control rules that was exported from Kaspersky Embedded Systems Security 4.0.
Click Open.
Click Import.
Imported Applications Launch Control rules are added to the list of existing rules. Rules with identical settings are not duplicated. If at least one rule setting is unique, the rule is added.
If the check box is selected, Kaspersky Embedded Systems Security uses the checksum of the file to generate the rule when both the checksum and the certificate of the file are available.
If the check box is cleared, Kaspersky Embedded Systems Security uses the digital certificate of the file to generate the rule when both the checksum and the certificate of the file are available.
If necessary, specify the name of the group of managed devices in the Use events generated for a group of managed devices field.
Click Generate rules.
From the Rule for adding to the main list drop-down list, select the principle for adding the rules to the list of previously created Application Launch Control rules:
Add to existing rules, if you want to add the imported rules to the list of existing rules. Rules with identical settings are duplicated.
Replace existing rules, if you want to replace the existing rules with the imported rules.
Select rules that you wnat to export into Application Launch Control rules of the policy and click the Export button.
Save your changes.
If necessary, perform step 5 to add more Applications Launch Control rules.
If necessary, edit the added Applications Launch Control rules by clicking the Edit button.
If necessary, delete the added Applications Launch Control rules by clicking the Delete button.