| 5.4.2. Is it possible to leverage Application and Device Control | 
| 5.4.2.3. Using Application and Device Control in Symantec Endpoint Protection | 
|  | 5.4.2.3.1. LINK http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2009101410542148?Open&docid=2010011510455048&nsf=ent-security.nsf&view=docid |