4.4.2.1. LINK http://www.symantec.com/avcenter/security/ADC/Configuring_Application_Control_1.1.pdf
4.4.2. Is it possible to leverage Application and Device Control
4.4.2.1. LINK http://www.symantec.com/avcenter/security/ADC/Configuring_Application_Control_1.1.pdf
4.4.2.2. Is threat spreading through Autorun.inf files?
4.4.2.3. Using Application and Device Control in Symantec Endpoint Protection
4.4.2.4. Hardening Symantec Endpoint Protection with an Application and Device
By
Efrain Ortiz
Symantec