Introducing Application Monitoring
The Application Monitoring functionality allows you to create the following different types of monitoring of the applications installed on the remote clients in your network:
- application execution and usage
- prohibited applications
- protected applications that are self-healed when found corrupted.
The four steps of Application Monitoring
Application Monitoring consists of four consecutive steps:
- Software inventorying :
Finding all the applications that are to be monitored in any way via either the- Software inventory
- Software catalog
- or creating applications via the custom applications
- Defining :
In this second phase the actual applications lists is created, their type defined, that is, if the chosen applications are monitored for their usage, prohibited from execution or monitored for possible corruption and consecutive repairing. In this phase the required schedule templates are create and assigned and they are also assigned to their targets on which they are monitored. - Monitoring :
In this third step the usage of the application is monitored: it is stopped if illegally launched or repaired if it was found to be corrupted. - Reporting :
In this last step reports are generated on individual devices, device groups or applications on their usage or launch prohibition.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*