Home    SecuLution Dokumentation back next
Welcome
SecuLution technique and terminology
Quick start
Test setup in 30 minutes
Best practice in everyday use
Full setup and deployment in 5 hours
Installation of components
Install Appliance
AdminWizard installation
Agent installation
Syslog server installation
Initial configuration tasks
Configure basic settings
Agent configuration
Configure automated tasks
Manage whitelist
Initial whitelist generation
Import trustworthy software
Learn mode
Check deployment and learning progress
Audit
Add entries to whitelist
Drag'n'drop
Individual lernmode
Import from directory
PermanentLernUser
Log alarms
Cleanup whitelist
Manually delete unused entries
Delete entries using a pattern
Clean up classifications
Managed Whitelist
Managed Whitelist
Actions
Actions
Referring rules to objects
Offline mode
Offline mode
Devices
USB device management
USB device encryption
RCM
Agent deployment (RemoteClientManagement)
ArpWatch
ArpWatch
Logs
Logs
FAQ
setup.ini

Actions

For each hash, there is a list of rules:



You can see static (path, filename) and dynamic (remark, usage, class) properties of the hash, as well as one action (allow).

Depending on what the hash represents (program, device or configuration option), different actions can be configured:

Rules applying to programs:



Rules applying to devices:



Rules as configuration options:



These rules are enforced by the agent and are therefore dependent on the version of the SecuLution Agent. It is generally recommended to always use the latest version of the Agent.

Minimum requirements:

  • Rules for USB devices: SecuLution Agent 1.16.31 or later
  • Encryption for USB devices: SecuLution Agent 1.17.41 or later
  • "Ask - Display comment, ask user": SecuLution agent 1.18.5 or later
  • "Redirection - start another program instead": SecuLution agent 1.18.5 or later
  • "Redirection - start another program as SYSTEM instead": SecuLution agent 1.18.5 or later