У нас вы можете посмотреть бесплатно How to Deploy and Manage Application Allowlisting [ThreatLocker Webinar] или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Application Allowlisting allows IT professionals to create a list of approved software needed for their company's daily operations. This list blocks all other software from running, including malware. It goes beyond traditional security tools by preventing both known and unknown malware, as well as untrusted applications and software, from running unless specifically authorized by the company. CEO Danny Jenkins and Chief Product Officer Rob Allen walk through: The process of adopting and managing the ideal application allowlisting strategy. Weighing modern application control tactics and technologies with formerly traditional approaches to endpoint security. Discussing what you can then add on top of allowlisting to further your organization's Zero Trust security posture. Get $200 off your ticket to Zero Trust World when you register with code ZTWWEBALLOW25 (offer expires 12/31/24): https://zerotrustworld.threatlocker.c... Book a Demo: https://www.threatlocker.com/book-a-t... LinkedIn: / threatlockerinc Facebook: / thethreatlocker Twitter: / threatlocker Instagram: / threatlocker 00:00 - Zero Trust World 2025 01:25 - Introduction 04:00 - 3 Reasons why Allowlisting is critical 11:41 - Q) Can you also stop apps from the Windows App Store? 12:56 - Q) Are you able to Whitelist Windows Store applications? 13:47 - Q) Do the built-in compression tools for Windows also allow for data exfiltration if the ZIP file is password protected? 15:18 - How does Allowlisting work? 18:25 - Risks associated with certificates 21:27 - Adding to an allowlist 24:54 - Q) Should we have the ability to add the public key as part of the parameters in ThreatLocker? 27:05 - Q) Should users be included in the allowlist? 28:00 - The pitfalls of Allowlisting 29:31 - Keeping dev folders structured 31:27 - Steps to making an Allowlisting solution effective 33:58 - Q) What is the best practice with Learning Mode and Global Policies in ThreatLocker? 38:15 - Steps to effectively using ThreatLocker Allowlisting 53:28 - Q) Is there a way to determine when the last time an application control policy triggered? 55:35 - Outro ©2024 ThreatLocker® Inc., All Rights Reserved.