Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

 Administrators

Administrators

Configuring Asset Management Module

Configuring Asset Category Using Form Builder

Configuring My Asset List Page

Custom Scheduler Jobs

Asset Masters

Configuring Location And Store

Configuring Asset Purpose

Configuring Action Attribute

Configuring Fault Type

Configuring Solution Type

Configuring Notifications and Templates

Configuring Allocation Form Template

Configuring Key Field Mapping

Configuring Data Templates

Configuring Field Display Order on Fixed Asset List Page

Software

Software Request Mapping Form

Adding/ Updating Software

License Mapping

Blacklisting Software

Configuring Software Baseline Profiles

Software Baseline Profile Mapping

Configuring Software License

License Key Mapping

Depreciation

Configuring Depreciation Formula

Configuring GAAP Depreciation

Configuring Depreciation Field Mapping

Configuring Custom Depreciation Formula

Mapping

Discovery Mapping

Configuring CMDB Mapping

Procurement Mapping

Account Mapping

Configuring Custom Hardware Variance

Mapping ServiceNow Category

Application Control

Creating and Updating Profile

Mapping Profiles

Configuring Application Control Messages

Configure Software and Executable Execution Type

Viewing Software Process List

Endpoint Compliance

Endpoint Dashboard

Viewing Endpoint Profile List

Configuring Endpoint Profile

Viewing Dynamic Endpoint

Configuring Dynamic Endpoint

Mapping Endpoint Profile

Endpoint Automation

Endpoint Automation Scripts

Endpoint Automation Scheduler

Endpoint Automation Profile Mapping

Patch Management

Viewing Patch List

Creating Asset Groups

Configuring Patches

Others

Configuring Asset Application Settings

Configuring Asset Movement

Configuring Asset Alerts

Configuring Store Threshold

Configuring Asset Scan Domain List

Configuring Local Password Management

Configuring E-mail Notifications

Configuring Asset Integration Details

Configuring Additional Discovery

Scheduling Asset Physical Verification

Configuring Product Price

Adding Software Deployment Profile

Approval Matrix

Configuring Approval Matrix

Configuring Approver Role

Mapping Approver

Deactivation Approval Matrix

Configuring Deactivation Approval Matrix

Configuring Approver

Configuring Location-Wise Approvers

SUMMIT Software Center

Description

Using Application Control, the Administrators can ensure that no unauthorized software is installed on any Asset on the organization’s network. Application Control allows the installation of only authorized and licensed software. This is useful to classify the applications as Whitelisted, Blacklisted, or Warning software. The applications that already exist on the Assets are initially Whitelisted by default. However, the Administrator can create multiple Profiles for Whitelisting, which can be applied to user, user groups, IPs, and locations. After a Whitelist Profile is applied to the end user machine all the software, which are not part of the Whitelist are Blacklisted. 

Example: Administrators can create a default Profile that comprises applications that are default for all Asset machines and apply this Profile for all the users. Similarly, Profiles can be created and applied to VIP users. 

Application Control feature is used by Administrators to configure software as White list, Blacklist, or Warning. They can create Profiles and map the Profiles to Assets. This feature enables the Asset Managers to keep a track of the software installed on Assets.

Advantages

  • It prevents users from installing any unwanted software, malware, virus, or any other software that may cause harm or may not be suitable for installation.
  • Using Application Control, the installation of unwanted patch and OS upgrades can be also avoided.
  • Application Control also restricts the users from execution of the Blacklisted software, if it is already installed.

Accessing the Feature

In the SUMMIT Application, Administrators can configure the Application Control options.


  • No labels