Skip to main content

Use Cases:
  • Gain visibility into applications installed on employee devices to support upgrade planning, standardization, and compliance with standards such as ISO 27001, PCI-DSS, and HIPAA.
  • Identify and remove unauthorized applications (e.g., file sharing tools, insecure chat softwares).
  • Rapidly detect applications containing critical vulnerabilities to ensure timely removal and minimize the risk of endpoint compromise.

Feature Details

View Installed Software

Administrators can review the software installed on any device by following these steps:
1
2
3

View installation details

Here, you can view the complete list of software installed on the device or search for specific softwares.software-installed-list.png

Block Software

To block a specific application, Administrators should perform the following steps:
1
2
3

Configure blocking rules in the policy creation screen:

  • Path: The file path to the application on the device. You can use operators such as equals, contains, starts with, or ends with to target the specific software.
  • Hash: The cryptographic hash of the software (using SHA-256). You must enter the correct hash value to effectively block the application.
  • Process Name: The name of the process when the software is running. You can use operators such as equals, contains, starts with, or ends with to target the software.

How to find process names on Windows:

1. Typically, the process name matches the software name. Administrators can try entering the software name into the Name field.2. If blocking is unsuccessful, the process name may differ from the software name. To find the correct process name:
  • Open the software you wish to block.
  • Open Task Manager locate the running software.
  • The process name listed there is the value required for the policy.
  • Signature: You can choose to block unsigned software (including software that is unsigned, self-signed, or not certified by a trusted organization).
    Note: Signature verification does not apply to the Linux operating system.
    software-block-rules.png
4
You can combine multiple rules to create a comprehensive blocking policy using AND and OR logic:
  • AND: Groups two or more rules together. The software is blocked only when all rules in the group are met.
  • OR: Connects rules or rule groups. The software is blocked if at least one connected rule or rule group is met.
5
6
software-policy-list.png
Administrators can temporarily disable, edit, or delete existing policies as needed.