/
Authorization Policy Components

Authorization Policy Components

Policies can occur along a number of "Authorization" lines to allow, or deny, the user access to potentially dangerous (or questionable) applications:

  • Adware and Potentially Unwanted Applications (PUAs) -- Certain applications can be incorrectly identified as adware or PUAs.  This policy allows an administrator to "set" the application to be available to run or not run on a computer.
  • Buffer Overflow -- Again, the administrator can set or deny access to specific applications that seem to be misbehaving by overflow their memory buffers.  Sometimes this is a method used by hackers to gain access to your computer, but sometimes, buffer overflows can occur from a poorly written application that doesn't manage memory in an effective fashion.
  • Suspicious Files -- Some applications raise red flags by how they are named.  For example, infection.exe might be something you may or may not want to run on your computer.  Well, anti-virus programs don't know what to do with them, so they get flagged for review by support personnel.
  • Suspicious Behavior -- Sometimes, infected files are good files that have been rewritten to misbehave on a computer.  If a file begins to act in a suspicious fashion on a system, it can be allowed or denied on your system by support personnel.
  • Website Blocking -- Certain websites might be blocked by the anti-virus system, or they can be "opened" by a systems administrator to allow access to them.