In the main application window, click the button .
In the application settings window, select Security Controls → Application Control.
Click the Blocked applications or Allowed applications button.
This opens the list of Application Control rules.
Click the Add button.
This opens the Application Control rule settings window.
On the General settings tab, define the main settings of the rule:
In the Rule name field, enter the name of the rule.
In the Description field, enter a description of the rule.
Compile or edit a list of users and/or groups of users who are allowed or not allowed to start applications that meet the rule trigger conditions. To do this, click the Add button in the Subjects and their rights table.
By default, the Everyone value is added to the list of users. The rule applies to all users.
If there is no user specified in the table, the rule cannot be saved.
In the Subjects and their rights table, use the toggle to define the right of users to start applications.
Select the Deny for other users check box if you want the application to prevent programs that satisfy rule triggering conditions from running for all users that are not listed in the Subjects and their rights table and are not members of user groups listed in the Subjects and their rights table.
If the Deny for other users check box is cleared, Kaspersky Endpoint Security does not control the startup of applications by users that are not specified in the Subjects and their rights table and that do not belong to the groups of users specified in the Subjects and their rights table.
If you want Kaspersky Endpoint Security to consider applications matching the rule trigger conditions as trusted updaters allowed to create other executable files that will be allowed to run subsequently, select the Trusted Updaters check box.
On the Conditions tab, create or edit the list of inclusion conditions for triggering the rule.
On the Exclusions tab, create or edit the list of exclusion conditions for triggering the rule.
When Kaspersky Endpoint Security settings are migrated, the list of executable files created by trusted updaters is migrated as well.