Space banner


This version of the product is in limited support. However, the documentation is available for your convenience. You will not be able to leave comments.

Getting started with Application Monitoring

The Application Monitoring functionality allows you to create the following different types of monitoring of the applications installed on the remote clients in your network:

  • Application execution and usage
  • Prohibited applications
  • Protected applications that are self-healed when found corrupted.

The following topics are provided:

The four steps of Application Monitoring

Application Monitoring consists of four consecutive steps:

  • Software inventorying:
    Finding all the applications that are to be monitored in any way via either the Software inventory or by creating applications via the custom applications.
  • Defining:
    In this second phase the actual applications lists is created, their type defined, that is, if the chosen applications are monitored for their usage, prohibited from execution or monitored for possible corruption and consecutive repairing. In this phase the required schedule templates are create and assigned and they are also assigned to their targets on which they are monitored.
  • Monitoring:
    In this third step the usage of the application is monitored: it is stopped if illegally launched or repaired if it was found to be corrupted.
  • Reporting:
    In this last step reports are generated on individual devices, device groups or applications on their usage or launch prohibition.

Automatic Application Monitoring

Automatic Application Monitoring in Client Management is performed via Application Management. The system will automatically discover all applications available for monitoring, prohibiting and self-healing.

When these are defined and assigned to devices or device groups, tracked and/or prohibited in their usage, they can also be "healed", if they are corrupted.

The main object of this functionality is the Application List. It groups software into monitored, prohibited and protected categories in the following way:

  • Scanned Application — the application list is populated with individual software applications, found by the software inventory.


You should have Adobe Acrobat Reader or a similar application installed, as the following topics are based on it. However, you can also execute these examples by replacing them with another application that you installed on your devices.

Related topics

Was this page helpful? Yes No Submitting... Thank you