Lock Out Malicious Software and Unauthorized Programs
When a virus, worm or other type of malicious software hits a network, the standard procedure for remediating the attack is to disable and delete the virus, and then apply the proper Microsoft-supplied Windows patch.
However, infected systems can become so overloaded by a virus that they're unable to apply the required patches and hot fixes. In this situation, IT administrators must remove the system from the network and then manually terminate the virus process and clean the infected system. Only then will system activity subside enough to accept the patch.
This procedure often involves a physical visit to each infected machine, which can quickly accumulate into hours spent fighting the attack.
Identify and Block Malicious Software
Using patented Access Control List (ACL) management technology called Cratering, User Manager Pro Suite can identify and block malicious software from executing on client systems, rendering it harmless and preventing propagation throughout the Windows network.
Cratering removes the existing default permissions on the virus file and replaces them with a single ACL "Deny" entry set to "Everyone:Full." This locks out all access to everyone, including the operating system. The virus is unable to start and a new infection does not take hold since the disabled virus file cannot be overwritten.
IT administrators can even take the proactive step of using Cratering to insert a series of files with known virus names that are ACL locked-out on all machines. If known malware attempts to infect the system, it will be unable to do so because a locked file has already taken its place.
Cratering does not apply only to malicious software. It can also prevent any unauthorized applications from running on clients, helping organizations ensure compliance with their IT security policies.