You can disable the following CA Access Control interceptions at the kernel level:
Even when the network, process, registry, and file classes are disabled and you are not using those classes to intercept kernel activity, the network, process, registry, and file interception processing code is initiated at boot time and working at run time, affecting performance. To improve performance, you can disable one or more interceptions from initiating at boot time.
To disable CA Access Control interceptions at the kernel level
The entries must be created under the following registry key:
HKLM\SYSTEM\CurrentControlSet\Services\drveng\Parameters
CA Access Control reloads without initializing the disabled interception types.
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |