- Created by Chilukuri Srinivasa Reddy (Unlicensed), last modified by Shilpa K on Apr 22, 2024
You are viewing an old version of this page. View the current version.
Compare with Current View Page History
« Previous Version 7 Next »
Variance
Import
Importing and Allocating Assets in Bulk
Activating or Deactivating and Moving Assets in Bulk
Approvals
Verifying Asset Reconciliation
Approving Physically Verified Assets
Approving Store Wise Reconciled Assets
Approving Asset Using Maker-checker
Contract Management
Adding Contract or Agreement Details
Software Delivery
Configuring Software Delivery Schedule
Viewing Software Delivery Status
Viewing Software Uninstallation Report
Configuring Asset Management Module
Configuring Asset Category Using Form Builder
Configuring My Asset List Page
Asset Masters
Configuring Location And Store
Configuring Notifications and Templates
Configuring Allocation Form Template
Configuring Field Display Order on Fixed Asset List Page
Software
Configuring Software Baseline Profiles
Software Baseline Profile Mapping
Depreciation
Configuring Depreciation Formula
Configuring Depreciation Field Mapping
Configuring Custom Depreciation Formula
Mapping
Configuring Custom Hardware Variance
Configuring Application Control Messages
Configure Software and Executable Execution Type
Endpoint Automation Profile Mapping
Others
Configuring Asset Application Settings
Configuring Asset Scan Domain List
Configuring Local Password Management
Configuring E-mail Notifications
Configuring Asset Integration Details
Configuring Additional Discovery
Scheduling Asset Physical Verification
Adding Software Deployment Profile
Approval Matrix
Deactivation Approval Matrix
Configuring Deactivation Approval Matrix
What is Whitelisting/Blacklisting Software?
You can add, view, and modify the software categorization and Whitelist or Blacklist them. Only Whitelisted Software can be installed on the desktops in an organization. The Blacklisted Software are the list of software that may cause a threat to the organization's security.
Advantages of Software Blacklisting
- Helps to organize all software as Whitelisted (allowed) or Blacklisted (prohibited)
- Alert emails are sent to the Administrators if a user installs a blacklisted application
- Controls the use of unauthorized software
Reports
See: Whitelist Or Blacklist Software Report
To Whitelist/Blacklist Software:
- Select Asset > Configuration > Software > Software Blacklisting.
- On the WHITE/BLACK LIST SOFTWARE page, select the Tenant. On the FILTERS pop-up page, select the filter options to view a list of White, Black, ALL, or None Software. For more information about fields and icons on the FILTERS pop-up page, see Filters.
- Select the New Restriction Status from the list and select the check box for the Software whose Restriction status you want to set.
- White List: If selected, indicates that the selected Software is a licensed software type and can be installed.
- Black List: If selected, indicates that the selected software is of the unlicensed software type or may harm the users' computer. The Software listed under Black List should not be installed.
- None: If selected, indicates that no restriction is defined for the Software.
- Click SUBMIT.
Figure: SOFTWARE BLACKLISTING page
ACTIONS
This section explains all the icons displayed on the ACTIONS panel of the SOFTWARE BLACKLISTING page.
Filters
Click the Filters icon to specify a particular filter criteria to display a list of Software to White list or Blacklist. On clicking the Filters icon, the FILTERS pop-up page is displayed.
Figure: FILTERS pop-up page
The following table describes the fields on the FILTERS pop-up page:
Field | Description |
---|---|
Vendor | Select a vendor from the list. |
Software Name | Type in the Software name or a part of the Software name to search the Software. You can also use the wildcard search '%'. |
Restricted Status | Lists all the configured restriction status. Select a restriction status from the list. |
- No labels