Appearance
Application control is implemented using cryptographic hash rules, publisher certificate rules or path rules.