1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Symantec Endpoint Protection Application and Device Control

Security Updates

Security Updates give you the most recent protection content for your Symantec security products.

Symantec Endpoint Protection Application and Device Control

Symantec Endpoint Protection Application and Device Control enables extra security protection for client systems. Simple rules created with Application and Device Control can enforce security policies and stop unknown malware. This page is a resource for those looking to get the most out of this feature.

How Application and Device Control works

Application Control is an advanced security feature included in Symantec Endpoint Protection. Application Control provides administrators with the ability to monitor and/or control the behavior of applications. Read more about how to take full advantage of Application Control Policies.


Examples of what Application Control can do

Block Attacks from removable drives
Network worms take advantage of USB and other types of removable drives. Application Control can be used to block this attack vector while still allowing an organization to use removable media like USB drives.
Prevent unknown PDF attacks
Web-based attacks are often hiding inside a PDF file. An Application Control rule can easily stop known and known attacks that hide in PDF files by preventing Acrobat and Acrobat Reader from writing code to a machine.

Prevent registration of new browser helper objects.
Browser Helper Objects, also known as BHOs, are commonly used by threats to spy on or interfere with web browsing. If your organization does not allow BHOs or has a pre-installed set of allowed BHOs, you can block all unwanted BHOs.

Download additional policy files
These and other policy files created for Symantec Endpoint Protection clients, can be downloaded from our support site.


Community Resources

The Symantec user community has created some useful rule sets. This page provides links to a selection of the best.


Additional Documentation

For more information about Application and Device Control, please check the following resources:

Security Response Blog
The State of Spam
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube