Why would one assign Allow vs. Protect to an application in the Application Protection area of Identity Protection?
Page 1 / 1
Hello and Welcome to the Webroot Community!
The Identity Shield is mainly for Web Browsers and you can add any other Web Facing Programs such as Email Client, Adobe Reader or anything you would like to protect. Now sometimes programs show in there and if you want to keep it there that's fine as you said something is under Allow if you feel it should be there and want to Protect put it under Protect or even remove and if you want you can Block that Program from seeing any Protected Data see here for more info: http://www.webroot.com/En_US/SecureAnywhere/PC/WSA_PC_Help.htm#C6_IDProtection/CH6c_ManagingProtectedApps.htm
Thanks,
Daniel ;)
See my setup as I do add a few things to the ID Shield:
The Identity Shield is mainly for Web Browsers and you can add any other Web Facing Programs such as Email Client, Adobe Reader or anything you would like to protect. Now sometimes programs show in there and if you want to keep it there that's fine as you said something is under Allow if you feel it should be there and want to Protect put it under Protect or even remove and if you want you can Block that Program from seeing any Protected Data see here for more info: http://www.webroot.com/En_US/SecureAnywhere/PC/WSA_PC_Help.htm#C6_IDProtection/CH6c_ManagingProtectedApps.htm
Thanks,
Daniel ;)
See my setup as I do add a few things to the ID Shield:
Daniel,
Thank you for your reply. My foray into the Identity Protection area is due to a program that Cut and Paste will not work in unless the program is assigned either Allow or Protect (Deny was the default Webroot assigned to it).
I read the Web page you referred to prior to my first post. That page was the reason I posted in the first place. I am trying to understand the difference between Allow and Protect. It seems to me that Allow is inviting trouble:
"Allow. “Allowed applications” are not secured against information-stealing malware, and also have full access to protected data on the system."
Why would you want anything to be set to Allow if it's not secured? Why is this even an option?
Thank you for your reply. My foray into the Identity Protection area is due to a program that Cut and Paste will not work in unless the program is assigned either Allow or Protect (Deny was the default Webroot assigned to it).
I read the Web page you referred to prior to my first post. That page was the reason I posted in the first place. I am trying to understand the difference between Allow and Protect. It seems to me that Allow is inviting trouble:
"Allow. “Allowed applications” are not secured against information-stealing malware, and also have full access to protected data on the system."
Why would you want anything to be set to Allow if it's not secured? Why is this even an option?
I probably have answered my own question upon reading the Allow explanation once again.
"Allow ... Many applications unintentionally access protected screen contents or keyboard data without malicious intent when running in the background"
So Allow is for programs one trusts that (un)intentionally access areas that Protect would block, but may need for functional reasons.
Clear now after numerous readings. I'm not sure why it took so long to sink in.
"Allow ... Many applications unintentionally access protected screen contents or keyboard data without malicious intent when running in the background"
So Allow is for programs one trusts that (un)intentionally access areas that Protect would block, but may need for functional reasons.
Clear now after numerous readings. I'm not sure why it took so long to sink in.
Correct here is some info I got from one of Webroot's Product Managers @ :
1. As you are undoubtedly aware, the Application Protection list serves two purposes· It can be used to designate processes whose data should be protected (the Protect column)· It can be used to designate processes that specifically are allowed or denied access to protected data (Allow and Deny columns)And yes a process cannot be both protected and allowed at the same time (not sure about a real world use case for protected and deny). While it seems more intuitive to have two separate lists, Protect and Allow/Deny, there may be developmental considerations that favor one list. If possible I would be in favor of two, but I don’t hear many others requesting enhancements to this area.I hope this is helpful and I appreciate you pointing out that discussion. If you have any other questions, please let me know.Thanks!BradAlso here is the Feature Request to ask for 2 lists if you like just Kudo the Topic as more Kudo's more of a chance to get into WSA. https://community.webroot.com/t5/Ideas-Exchange/Identity-Shield-Enhancements/idi-p/183620
Hope it helps,
Daniel 😉
1. As you are undoubtedly aware, the Application Protection list serves two purposes· It can be used to designate processes whose data should be protected (the Protect column)· It can be used to designate processes that specifically are allowed or denied access to protected data (Allow and Deny columns)And yes a process cannot be both protected and allowed at the same time (not sure about a real world use case for protected and deny). While it seems more intuitive to have two separate lists, Protect and Allow/Deny, there may be developmental considerations that favor one list. If possible I would be in favor of two, but I don’t hear many others requesting enhancements to this area.I hope this is helpful and I appreciate you pointing out that discussion. If you have any other questions, please let me know.Thanks!BradAlso here is the Feature Request to ask for 2 lists if you like just Kudo the Topic as more Kudo's more of a chance to get into WSA. https://community.webroot.com/t5/Ideas-Exchange/Identity-Shield-Enhancements/idi-p/183620
Hope it helps,
Daniel 😉
Kudoed the Feature Request you mentioned, Daniel, and also your last answer. Thank you for your help.
Your very Welcome if you have any further questions feel free to ask!
Cheers,
Daniel 😉
Cheers,
Daniel 😉
Reply
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.