all the Untrusted applications, processes,
files and folders in the Untrusted zone.
DefenseWall has aDefault
Built-in Untrusted List of popular, most-used Internet
Browsers, E-mail clients, Instant Messengers, Internet Relay Chat clients, Media
Players, P2P clients and Download Managers, plus internet-facing system utilities.
After installation, DefenseWall scans for Default Untrusted applications and adds
them to the list.
Manually add any other 'threat gateway' applications executable files (.exe) that
are not on the Built-in Default list.
started from within Untrusted folders will run Untrusted.
Note: the following Untrusted applications will update in their default untrusted
state - Mozilla Firefox, SeaMonkey, Thunderbird, Opera(old), Internet Explorer,
uTorrent and ICQ.
Add Process, Application, Folder
Add new items into the Untrusted Applications List - Click through to select item in
your file system - click Apply!
Removes item from the Untrusted ApplicationsList. Application files and folders
are not affected. If youremove applications from the Untrusted List, they will run
as trusted unless they are affected by untrusted inheritance rules(see below).
Select item - click Remove - Confirm - Apply!
Run as trusted
Select item - click Run as trusted. The application will be immediately started as
(set as trusted) and revert to untrusted. Select item - click Enable (or) Disable - Apply! Disabled item is highlighted in Red.
Select item and click Move - Move item up or down the List - Apply!
Launches the Untrusted Application Excludes List in order to add an Untrusted
application; to allow to run Trusted.
Right-click on an item - there is an additional option to permanently delete item
from your system - files and folders are not affected.
Untrusted inheritance rules:A process will run Untrusted if:
is within the Untrusted Applications Default Built-in List database.
is run by an Untrusted process.
is under the Untrusted file open inheritance ruleset. (ie: if the Trusted process
Microsoft Office opens an 'untrusted' document, Microsoft Office will convert to
· LibreOffice is fully supported.
· OpenOffice.org is fully supported.
· IBM Lotus Symphony® office suite is fully supported.
· Microsoft Office® and built-in WordPad are fully supported.
· Atlantics Word Processor is fully supported.
·PDFs are fully supported.
· Portable Firefox, Thunderbird and Opera are supported: Program executable
(.exe) must be added manually to the Untrusted List by user.
· DefenseWall supports safe, Untrusted double-click decompression of Untrusted
Archive files for many external archive programs (WinRAR, WinZip, 7-Zip, etc.).
Windows Compressed (zipped) feature utility is fully supported.
Zip (archives) run Untrusted if the zip file is untrusted, and run Trusted if the zip
file is trusted. Do not run contents directly from archives.
Want to find an item in the Untrusted Applications list?
Press F3 or Ctrl+F.