Computer Management

SOFTWARE RESTRICTION POLICY

 

Description and introduction.

     Software restriction policies ( SRP ) description is group policy based feature that identifies software programs running on computers in a domain, and controls the ability of those programs to run. Software restriction policies are part of the security and management strategy to assist in increasing the reliability, integrity, and manageability of the computers.

     Software restriction policies provide administrators a highest authority to identify software and control its ability to run on the local computer. These policies can be used to protect computers running operating systems against known conflicts and safeguard the computers against security threats such as malicious viruses,  Trojan horse programs and unauthorized users. You can also use software restriction policies to create a highly restricted configuration for computers, in which you allow only specifically identified applications to run. Software restriction policies are integrated with active directory and group policy. You can also create software restriction policies on stand alone computers.

     Software restriction policies are trust policies, which are regulations set by an administrator to restrict scripts and other code that is not fully trusted from running. The Software Restriction Policies extension to the local group policy editor provides a single user interface through which the settings for restricting the use of applications can be managed on the local computer or throughout a domain.

      Business users collaborate by using e mail, instant messaging, and peer to peer applications. As these collaborations increase, especially with the use of the Internet in business computing, so do the threats from malicious software code, such as worms, viruses, and malicious user or attacker threats.

     Users might receive hostile code in many forms, ranging from native executable files (.exe files), to macros in documents (such as .doc files), to scripts (such as .vbs files). Malicious users or attackers often use social engineering methods to get users to run code containing viruses and worms. (Social engineering is a term for tricking people into revealing their password or some form of security information.) If such code is activated, it can generate denial of service attacks on the network, send sensitive or private data to the Internet, put the security of the computer at risk, or damage the contents of the hard disk drive, or the hardware.

     IT organizations and users must be able to determine which software is safe to run and which is not. With the large numbers and forms that hostile code can take, this becomes a difficult task. To help protect their network computers from both hostile code and unknown or unsupported software, organizations can implement software restriction policies as part of their overall security strategy.

Administer Software Restriction Policies.

  • Determine allow/deny list and application inventory for software restriction policies
  • Work with software restriction policies rules
  • Use software restriction policies to protect your computer against an internal and external unauthorized users also all malicious software/code

Download Software Restriction Policies 2016.03