Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 8 Current »

 Administrators

Administrators

Configuring Asset Management Module

Configuring Asset Category Using Form Builder

Configuring My Asset List Page

Custom Scheduler Jobs

Asset Masters

Configuring Location And Store

Configuring Asset Purpose

Configuring Action Attribute

Configuring Fault Type

Configuring Solution Type

Configuring Notifications and Templates

Configuring Allocation Form Template

Configuring Key Field Mapping

Configuring Data Templates

Configuring Field Display Order on Fixed Asset List Page

Software

Software Request Mapping Form

Adding/ Updating Software

License Mapping

Blacklisting Software_AM

Configuring Software Baseline Profiles

Software Baseline Profile Mapping

Configuring Software License

License Key Mapping

Depreciation

Configuring Depreciation Formula

Configuring GAAP Depreciation

Configuring Depreciation Field Mapping

Configuring Custom Depreciation Formula

Mapping

Discovery Mapping

Configuring CMDB Mapping

Procurement Mapping

Account Mapping

Configuring Custom Hardware Variance

Mapping ServiceNow Category

Application Control

Creating and Updating Profile

Mapping Profiles

Configuring Application Control Messages

Configure Software and Executable Execution Type

Viewing Software Process List

Endpoint Compliance

Endpoint Dashboard

Viewing Endpoint Profile List

Configuring Endpoint Profile

Viewing Dynamic Endpoint

Configuring Dynamic Endpoint

Mapping Endpoint Profile

Endpoint Automation

Endpoint Automation Scripts

Endpoint Automation Scheduler

Endpoint Automation Profile Mapping

Patch Management

Viewing Patch List

Creating Asset Groups

Configuring Patches

Others

Configuring Asset Application Settings

Configuring Asset Movement

Configuring Asset Alerts

Configuring Store Threshold

Configuring Asset Scan Domain List

Configuring Local Password Management

Configuring E-mail Notifications

Configuring Asset Integration Details

Configuring Additional Discovery

Scheduling Asset Physical Verification

Configuring Product Price

Adding Software Deployment Profile

Approval Matrix

Configuring Approval Matrix

Configuring Approver Role

Mapping Approver

Deactivation Approval Matrix

Configuring Deactivation Approval Matrix

Configuring Approver

Configuring Location-Wise Approvers

SUMMIT Software Center

What is Whitelisting/Blacklisting Software?

You can add, view, and modify the software categorization and Whitelist or Blacklist them. Only Whitelisted Software can be installed on the desktops in an organization. The Blacklisted Software are the list of software that may cause a threat to the organization's security.

Advantages of Software Blacklisting

  • Helps to organize all software as Whitelisted (allowed) or Blacklisted (prohibited)
  • Alert emails are sent to the Administrators if a user installs a blacklisted application
  • Controls the use of unauthorized software

Reports

See: Whitelist Or Blacklist Software Report

To Whitelist/Blacklist Software:

  1. Select Asset > Configuration > Software > Software Blacklisting.
  2. On the WHITE/BLACK LIST SOFTWARE page, select the Tenant. On the FILTERS pop-up page, select the filter options to view a list of White, Black, ALL, or None Software. For more information about fields and icons on the FILTERS pop-up page, see Filters.
  3. Select the New Restriction Status from the list and select the check box for the Software whose Restriction status you want to set.
    • White List: If selected, indicates that the selected Software is a licensed software type and can be installed.
    • Black List: If selected, indicates that the selected software is of the unlicensed software type or may harm the users' computer. The Software listed under Black List should not be installed.
    • None: If selected, indicates that no restriction is defined for the Software.
  4. Click SUBMIT.

    SOFTWARE BLACKLISTING  page
    Figure:  SOFTWARE BLACKLISTING  page

ACTIONS

This section explains all the icons displayed on the ACTIONS panel of the SOFTWARE BLACKLISTING page.

Filters

Click the Filters icon to specify a particular filter criteria to display a list of Software to White list or Blacklist. On clicking the Filters icon, the FILTERS pop-up page is displayed.


Figure:  FILTERS pop-up page

The following table describes the fields on the FILTERS pop-up page:

Field

Description

Vendor

Select a vendor from the list.

Software Name

Type in the Software name or a part of the Software name to search the Software. You can also use the wildcard search '%'.

Restricted Status

Lists all the configured restriction status. Select a restriction status from the list.

  • No labels