Feature availability

Here is a list of Application Control and Change Control features and their availability for operating systems and supported configuration.

Feature Availability for operating systems Availability in supported configuration
Windows Linux Managed configuration Standalone configuration
Prevent execution of unauthorized binary files Yes Yes Yes Yes
Prevent execution of unauthorized libraries or DLLs Yes Yes Yes Yes
Prevent execution of unauthorized kernel drivers Yes No Yes Yes
Prevent execution of unauthorized scripts Yes Yes Yes Yes
Manage execution of Alternate Data Streams (ADSs) Yes Not applicable Yes Yes
Configure reputation-based execution of trusted binary files, DLLs, and drivers Yes No Yes No
Monitor file changes Yes Yes Yes Yes
Monitor registry changes Yes Not applicable Yes Yes
Monitor changes to user logon and logoff Yes No Yes Yes
Track content changes for files Yes Yes Yes No
Track content changes for directories Yes No Yes No
Read protect files and directories Yes Yes Yes Yes
Read protect drives Yes Not applicable Yes Yes
Read protect registry keys Yes Not applicable Yes Yes
Write protect files and directories Yes Yes Yes Yes
Write protect drives Yes Not applicable Yes Yes
Write protect registry keys Yes Not applicable Yes Yes
Define updater by name Yes Yes Yes Yes
Define updater by checksum Yes No Yes Yes
Manage updater privileges for scripts Yes Yes Yes Yes
Manage execution of files from trusted path Yes Yes Yes Yes
Manage certificate-based execution and updater privileges (for binary files, DLLs, and drivers) Yes No Yes Yes
Define trusted users Yes No Yes Yes
Manage installation and uninstallation of software packages (Package Control) Yes No Yes Yes
Manage installation of ActiveX controls Yes Not applicable Yes No
Use inventory updates Yes Yes Yes Yes
Use Observation mode Yes No Yes No
Configure memory protection Yes No Yes Yes
Configure Self-Approval Yes No Yes No
Use reboot-free activation Yes Yes Yes Yes
Use reboot-free deactivation No Yes Yes Yes
Run image deviation Yes Yes Yes No
Configure CLI breach notifications Yes No Yes No
Configure attribute-based rules Yes No Yes Yes