Application Control
|
|
What is Application Control?
Using Application Control, the Administrators can ensure that no unauthorized software is installed on any Asset on the organization’s network. Application Control allows the installation of only authorized and licensed software. This is useful to classify the applications as Whitelisted, Blacklisted, or Warning software. The applications that already exist on the Assets are initially Whitelisted by default. However, the Administrator can create multiple Profiles for Whitelisting, which can be applied to user, user groups, IPs, and locations. After a Whitelist Profile is applied to the end user machine all the software, which are not part of the Whitelist are Blacklisted.
Example: Administrators can create a default Profile that comprises applications that are default for all Asset machines and apply this Profile for all the users. Similarly, Profiles can be created and applied to VIP users.
Using Application Control, Administrators configure software as Whitelisted, Blacklisted, or Warning. They can create Profiles and map the Profiles to Assets. This helps the Asset Managers to keep a track of the software installed on the Assets.
Advantages
It prevents users from installing any unwanted software, malware, virus, or any other software that may cause harm or may not be suitable for installation.
Application Control also restricts the users from execution of the Blacklisted software if it is already installed.
Prerequisites
Create one or two Profiles, which will allow to block and unblock applications. For more information, see Create Profile.
Define software list to block and unblock software applications. For more information, see Define Software List.
Examples for Blacklisting/Whitelisting Software
Refer to the following scenarios as examples:
Accessing the Feature
In the SummitAI application, the Administrators can configure the Application Control options.
Configure the Application Control Messages (These messages are flashed while attempting to install Blacklisted or Warning software), see Configuring Application Control Messages.
Create or update Profiles by User, Location, IP Sub net Range, or Tenant, see Creating/Updating Profile.
Identify software as White list or Blacklist, see Configuring Software Blacklisting.
Map Profiles to Assets , see Configuring Profile Mapping.
View various related reports, such as White/blacklist Software and Application Control Details.