The ForbiddenProcesses control checks for running programs or background services that violate your organization's security or compliance policies. A "process" is any program currently running on your computer, whether visible or in the background. The specific list of forbidden processes is configured by your IT team.
Important: Citadel will tell you which specific process(es) need to be stopped. Processes may be forbidden because they represent malware, unauthorized software, cryptocurrency miners, remote access tools, or applications that violate security policies. Some forbidden processes run invisibly in the background without your knowledge, consuming resources, monitoring your activities, or communicating with external servers.
Forbidden processes may indicate malware or potentially unwanted programs running on your device. Detecting and stopping these processes prevents damage and data theft.
Some processes run without your knowledge, potentially monitoring your activities, stealing credentials, or providing remote access to attackers.
Forbidden processes may represent unauthorized software, crypto miners, or tools that violate company policies and create security or legal risks for the organization.
Stopping a process is temporary - it may restart when you reboot or when its parent application runs. To permanently fix this:
Stopping a process is temporary - it may restart when you reboot or when its parent application runs. To permanently fix this:
After stopping the forbidden process, Citadel will automatically verify this control during its next check.