Introduction - ACSC | Cyber.gov.au

effective mechanism in not only preventing malicious code from executing, but also ensuring only approved applications can be installed. When developing application control rules, defining a list of approved executables (e.g. .exe and .com files), software libraries (e.g. .dll and.ocx files), scripts (e.g. .ps1, .bat, .cmd, .vbs and .js files) and installers (e.g. .msi, .msp and .mst files ... ................
................