Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Scroll ignore | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||
Variance Import Approvals Contract Management Software Delivery Asset Masters Software Depreciation Mapping Others Approval Matrix Deactivation Approval Matrix |
Scroll export button | ||||||||
---|---|---|---|---|---|---|---|---|
|
Description
Using Application Control, the Administrators can ensure that no unauthorized software is installed on any Asset on the organization’s network. Application Control allows the installation of only authorized and licensed software. This is useful to classify the applications as Whitelisted, Blacklisted, or Warning software. The applications that already exist on the Assets are initially Whitelisted by default. However, the Administrator can create multiple Profiles for Whitelisting, which can be applied to user, user groups, IPs, and locations. After a Whitelist Profile is applied to the end user machine all the software, which are not part of the Whitelist are Blacklisted.
Example: Administrators can create a default Profile that comprises applications that are default for all Asset machines and apply this Profile for all the users. Similarly, Profiles can be created and applied to VIP users.
Application Control feature is used by Administrators to configure software as White list, Blacklist, or Warning. They can create Profiles and map the Profiles to Assets. This feature enables the Asset Managers to keep a track of the software installed on Assets.
Advantages
- It prevents users from installing any unwanted software, malware, virus, or any other software that may cause harm or may not be suitable for installation.
- Using Application Control, the installation of unwanted patch and OS upgrades can be also avoided.
- Application Control also restricts the users from execution of the Blacklisted software, if it is already installed.
Accessing the Feature
In the SUMMIT Application, Administrators can configure the Application Control options.
- Identify software as White list or Blacklist, see Configuring Software Blacklisting.
- Create or update Profiles by User, Location, IP Subnet Range, or Tenant, see Creating/Updating Profile.
- Map Profiles to Assets , see Configuring Profile Mapping.
- Configure the Application Control Messages (These messages are flashed while attempting to install Blacklisted or Warning software), see Configuring Application Control Messages.
- View various related reports, such as White/blacklist Software and Application Control Details.
Scroll ignore | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||
Release Notes | Installation Guide | Other Documents |