Space banner This version of the product has reached end of support. The documentation is available for your convenience. However, you must be logged in to access it. You will not be able to leave comments.

Introducing Application Monitoring


The Application Monitoring functionality allows you to create the following different types of monitoring of the applications installed on the remote clients in your network:

  • application execution and usage
  • prohibited applications
  • protected applications that are self-healed when found corrupted.

The four steps of Application Monitoring

Application Monitoring consists of four consecutive steps:

applists_process.png

  • Software inventorying :
     Finding all the applications that are to be monitored in any way via either the
    • Software inventory
    • Software catalog
    • or creating applications via the custom applications
  • Defining :
     In this second phase the actual applications lists is created, their type defined, that is, if the chosen applications are monitored for their usage, prohibited from execution or monitored for possible corruption and consecutive repairing. In this phase the required schedule templates are create and assigned and they are also assigned to their targets on which they are monitored.
  • Monitoring :
     In this third step the usage of the application is monitored: it is stopped if illegally launched or repaired if it was found to be corrupted.
  • Reporting :
     In this last step reports are generated on individual devices, device groups or applications on their usage or launch prohibition.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*