graphic Untrusted Applications Module
  



Untrusted Applications module shows all the Untrusted applications, processes, files and folders in the Untrusted zone.
 
DefenseWall has a Default Built-in Untrusted List of popular, most-used Internet Browsers, E-mail clients, Instant Messengers, Internet Relay Chat clients, Media Players, P2P clients and Download Managers, plus internet-facing system utilities.

After installation, DefenseWall scans for Default Untrusted applications and adds them to the list.

Manually add any other 'threat gateway'  applications executable files (.exe) that are not on the Built-in Default list. 

Note:  Applications started from within Untrusted folders will run Untrusted.

Note:  the following Untrusted applications will update in their default untrusted state - Mozilla Firefox, SeaMonkey, Thunderbird, Opera(old), Internet Explorer, uTorrent and ICQ.
                                                                                                   
 
graphic


Add Process, Application, Folder
Add new items into the Untrusted Applications List - Click through to select item in your file system  - click Apply! 

graphic


Add from Built-in list:
Runs the Default Built-in Untrusted database and adds the default items to List - click Apply! 

Remove:
Removes item from the Untrusted Applications List.  Application files and folders are not affected.  If you remove applications from the Untrusted List, they will run as trusted unless they are affected by untrusted inheritance rules(see below). Select item - click Remove - Confirm -  Apply!

graphic



Run as trusted
Select item - click Run as trusted. The application will be immediately started as Trusted.

Enable/Disable
Temporarily disable (set as trusted) and revert to untrusted.  Select item - click Enable (or) Disable -  Apply!  Disabled item is highlighted in Red.

Move Item
Select item and click Move -  Move item up or down the List - Apply!

Excludes
Launches the Untrusted Application Excludes List in order to add an Untrusted application; to allow to run Trusted.

Context Menu
Right-click on an item -  there is an additional option to permanently delete item from your system - files and folders are not affected.

graphic


Untrusted inheritance rules:  A process will run Untrusted if:

· It is within the Untrusted Applications Default Built-in List database.
· It is run by an Untrusted process.
· It is under the Untrusted file open inheritance ruleset. (ie: if the Trusted process Microsoft Office opens an 'untrusted' document, Microsoft Office will convert to Untrusted state.)

· LibreOffice is fully supported.
· OpenOffice.org is fully supported.
· IBM Lotus Symphony® office suite is fully supported.
· Microsoft Office® and built-in WordPad are fully supported.
· Atlantics Word Processor is fully supported.
· PDFs are fully supported.

· Portable Firefox, Thunderbird and Opera are supported: Program executable (.exe) must be added manually to the Untrusted List by user.

· DefenseWall supports safe, Untrusted double-click decompression of Untrusted Archive files for many external archive programs (WinRAR, WinZip, 7-Zip, etc.). Windows Compressed (zipped) feature utility is fully supported.

Zip (archives) run Untrusted if the zip file is untrusted, and run Trusted if the zip file is trusted.  Do not run contents directly from archives.

graphic Want to find an item in the Untrusted Applications list?  Press F3 or Ctrl+F.

graphic


graphic

Copyright  © 2004-2014   SoftSphere Technologies
All Worldwide Rights Reserved