Examples of what Application Control can do
Block Attacks from removable drives
Network worms take advantage of USB and other types of removable drives. Application Control can be used to block this attack vector while still allowing an organization to use removable media like USB drives.
Prevent unknown PDF attacks
Web-based attacks are often hiding inside a PDF file. An Application Control rule can easily stop known and known attacks that hide in PDF files by preventing Acrobat and Acrobat Reader from writing code to a machine.
Prevent registration of new browser helper objects.
Browser Helper Objects, also known as BHOs, are commonly used by threats to spy on or interfere with web browsing. If your organization does not allow BHOs or has a pre-installed set of allowed BHOs, you can block all unwanted BHOs.
Download additional policy files
These and other policy files created for Symantec Endpoint Protection clients, can be downloaded from our support site.
The Symantec user community has created some useful rule sets. This page provides links to a selection of the best.
For more information about Application and Device Control, please check the following resources: