Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

BloxOne BloxOne Application Discovery specifically monitors applications provides organizations with visibility into the applications associated with a higher risk of data loss and malware activity (for example, . This includes cloud storage, email, and VPN) applications, as well as applications that help you profile your protected assets, and applications often tied to unmanaged services commonly known as protected assets. BloxOne Application Discovery also monitors "Shadow IT" applications. "Shadow" applications are those applications associated with a higher probability of data loss risk, and applications that assist in profiling the actions of a protected asset.  Shadow IT , which are consumer and enterprise applications that are not managed by the organization but may still pose a risk of data loss or security threats. By monitoring these applications, organizations can identify potential threats and take the necessary steps to protect their network. The Application Discovery report also provides organizations with the ability to drill down into specific applications and view detailed information about their usage, allowing organizations to create appropriate security and organizational policies to address any potential threats.

The applications can be associated with Application Discovery report provides organizations with the ability to view details about their applications, including the software manufacturer and the protected asset that generated the application traffic. You can easily It also allows organizations to filter and drill down to the specific application or protected device, and then export the data if needed.Application Discovery monitors all applications operating on your network based on DNS traffic.  BloxOne Threat Defense Advanced then This report provides organizations with detailed information about their application traffic. This information can then be used to identify potential threats and take the necessary steps to protect their network. By using this report, organizations can gain a better understanding of the application activity on their network and take the necessary steps to protect it.

Application Discovery uses detection signatures to determine when an application is one of the following:

...

Application Discovery, which is accessed from Reports > Application Discovery, provides a means of detecting and managing the types and numbers of all applications on your organization's network: those approved and supported, awaiting review and approval, and not approved. Application Discovery is available to  BloxOne Threat Defense Advanced subscribers. 

Application Discovery makes it is possible to identify and track applications running on your network and to determine what activities each application is engaged in. By default, each application is assigned a status of Need Review. Based on the information obtained from Application Discovery, a system administrator will assign each application a status of Approved or Unapproved. If Application Discovery indicates that an application is safe, the system administrator will assign it a status of Approved; otherwise, the system administrator will assign it a status of Unapproved. An application's status can be revised and updated at any time. 

...