Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Application Discovery, which is accessed from Reports > Application Discovery, provides a means of detecting and managing the types and numbers of all applications on your organization's network: those approved and supported, awaiting review and approval, and not approved. Application Discovery is available to  BloxOne Threat Defense Advanced subscribers. 

Image: The Application Discovery dashboard provides an overview of application usage within an organization.

Application Discovery makes it is possible to identify and track applications running on your network and to determine what activities each application is engaged in. By default, each application is assigned a status of Need Review. Based on the information obtained from Application Discovery, a system administrator will assign each application a status of Approved or Unapproved. If Application Discovery indicates that an application is safe, the system administrator will assign it a status of Approved; otherwise, the system administrator will assign it a status of Unapproved. An application's status can be revised and updated at any time. 

...

Application Discovery allows you to specify if a detected application is an “Approved” application based on your organization’s policy.  In most organizations, blocking applications can be disruptive and lead to user dissatisfaction.  Instead, tracking approved and nonapproved applications allows you to monitor and decide the best action to take, such as user education or requesting approval for the variance.


Image: A detail view of the Application Discovery dashboard showing three status indicators for applications within an organization: 
"NEEDS REVIEW", "APPROVED", and  "UNAPPROVED".

The tracking of approved and unapproved applications on your network is important. Security and Compliance best practices call for maintaining an accurate inventory of applications in your organization.  Additionally, it provides protection for your organization from threats includes the protection of legitimate software used in inappropriate ways that might include a user storing sensitive customer data in unmanaged cloud storage, or malware that utilizes a consumer email to exfiltrate stolen data from the enterprise.

...