What good is this data?
Haven’t you ever wondered what all was installed on your computer? Now you’ll know.
In addition, from this page you are able to investigate each program using Details, Explorer… and Properties. If you see a program you don’t want running on your computer, block it. That’s right, simply by highlighting a program and selecting “Block”, you can prevent programs from running on your computer. Many people used this feature to block the Windows 10 update programs.
- Program Name: This is name of the program accessing the file/folder.
- Full Path: Is the fully qualified path to the program accessing the file/folder.
- Version: Version of the program.
- Architecture: 32 or 64 bit.
- First Detected: Contains the timestamp when WAR first detected the program. This is not the date time when the program was first installed.
- Additional columns are available in the Column Chooser.
- This is available by right-clicking on any column header and selecting “Column Chooser”. There are many features available under the right-click, we will not discuss those here.
- Simply drag and drop the column you want to add to or remove from the page.
- Columns include:
- File Create Date
- File Modified Date
- Signature (MD5)
- Updated At
By default, this data is sorted alphabetically by Program Name, but you can change that by clicking in the column header. A little “carrot” appears in the far right of the column header and points in the direction of sorting.
Allows you to manually add a program to the Programs Page. This feature is rarely used, but there just in case it is needed.
Allows you to manually add a folder to the Allowed Folder list. We explain this in more detail below.
Details provides you with a plethora of information about the selected program.
You can see % of users who allow and who block the program. In this case, we have very little data about this program so the percentages are still unknown.
You can see details about the program, including size, version, signature, MD5, SHA256 (SHA what? MD5 and SHA256 are useful for technical look-ups of the file in question) and more importantly other programs sharing the same signature.
From this screen you can view the Microsoft Properties page for the file in question.
If you’re confused about a file, open this tab. It may help you make a decision.
This opens a copy of Windows Explorer to the folder for the highlighted program. This allows you to quickly access folder in which any program is located so that you can investigate the program in more detail with ease.
Are you familiar with the Windows Properties page?
If so, you can access it from here.
If not, give it a click. The Properties page provides you with even more information about a particular file.
Some would say it is for more technical users, but you can’t hurt anything by opening it up, looking around and then clicking Cancel to close it.
If upon reviewing the program you’ve determined the program is something you don’t want running on your computer, you can set it as “Blocked”, this will result in WAR preventing this program from ever running.
When an item is blocked by WAR for any ready, the file is immediately quarantined. By marking a program as “Blocked”, you are putting in an extra safe-guard just in case this same file is every written out to disk again.
Allow by Signature
What does that even mean?
Actually this is quite simple. What allow by signature does is take the currently highlighted programs code signing certificate and then allows all programs signed with the same code signing certificate.
OK? What? Try that again…
This is useful after installing a new application or installing a new printer or other hardware that installs a user interface, update programs or other needed programs. Typically all of those programs are signed with the same code signing certificate, therefore by allowing the one certificate you are allowing all of the programs with a single click.
This is useful when you have programs that dynamically download content and then run it out of temporary or “user” folders. This is important enough of a feature that we also make this available on all “Action” pages so that you can add the folder in question without even having to navigate to that folder.
In a typical case, a program may download content to a folder like C:usersTestAppDataLocalCompanyversionxprogram.exe, with the folder changing with each version.
In this case, you should allow C:UsersTestAppDataLocalCompany, this will effectively allow all programs in the folders beneath.
We don’t really like this feature, but it is a necessary evil due to the seemingly endless ways programs are allowed to be stored and run in Windows.
This dialog allows you to edit allowed folders. The example above is a perfect example of why you would want to edit an allowed folder.
The program folder that is associated with the program is:
However, the last folder in this path “versionx” is dynamic, changing with each release. Therefore, when you allow the folder you should then edit that allowed folder and remove “versionx” from the end of it to ensure all future releases are allowed. You will edit the path so that it is this:
Is this screen full of old entries, things you don’t care about or entries you don’t want anyone else to see?
If so, then simply highlight some or all of the entries and click “Remote Data”. This will tell WAR will remove all of the highlighted items from the screen. Nothing is physically removed from your computer, we simply remove the data from this one screen and the underlying database.
Search for Programs
Clicking this tells WinAntiRansom to run Auto-Discovery again. This can come in handy if you’ve accidentally removed some programs from the list. WinAntiRansom automatically discovers programs when they are copied to a folder or renamed, so running Auto-Discovery post application installation/upgrade should not be necessary.