Getting started with Application Monitoring
The Application Monitoring functionality allows you to create the following different types of monitoring of the applications installed on the remote clients in your network:
- Application execution and usage
- Prohibited applications
- Protected applications that are self-healed when found corrupted.
The following topics are provided:
The four steps of Application Monitoring
Application Monitoring consists of four consecutive steps:
- Software inventorying:
Finding all the applications that are to be monitored in any way via either the Software inventory or by creating applications via the custom applications.
In this second phase the actual applications lists is created, their type defined, that is, if the chosen applications are monitored for their usage, prohibited from execution or monitored for possible corruption and consecutive repairing. In this phase the required schedule templates are create and assigned and they are also assigned to their targets on which they are monitored.
In this third step the usage of the application is monitored: it is stopped if illegally launched or repaired if it was found to be corrupted.
In this last step reports are generated on individual devices, device groups or applications on their usage or launch prohibition.
Automatic Application Monitoring
Automatic Application Monitoring in Client Management is performed via Application Management. The system will automatically discover all applications available for monitoring, prohibiting and self-healing.
When these are defined and assigned to devices or device groups, tracked and/or prohibited in their usage, they can also be "healed", if they are corrupted.
The main object of this functionality is the Application List. It groups software into monitored, prohibited and protected categories in the following way:
Scanned Application — the application list is populated with individual software applications, found by the software inventory.
You should have Adobe Acrobat Reader or a similar application installed, as the following topics are based on it. However, you can also execute these examples by replacing them with another application that you installed on your devices.
- Defining an Application for Usage Monitoring
- Defining an Application for Prohibited Launch Detection
- Defining an Application for File Corruption Protection
- Uploading Application Monitoring Events to the Master
- Generating Application Monitoring Reports
- Defining Applications to Use in Application Management
- Configuring Application Monitoring
- Adding an Application from a Device
- Monitoring Managed Applications