With the innumerable amount of applications available for users to install on their system (knowingly or not), it is critical that IT and security groups have visibility and control. Concerns like Shadow IT, riskware, grayware, potentially unwanted applications, and potentially unsafe applications are very real and can increase the chances of a breach, infection or other harmful event.
MetaAccess rapidly detects and categorizes installed applications on the system, as well as observing which are actively running. This information is encrypted and sent to MetaAccess cloud where it is added to the database for that device.
To setup application controls:
Log in to MetaAccess console
Go to Policies, then select a policy you desire to apply this
On Windows and macOS devices, select Unwanted Applications, you will then see a list of software categories. For each category, you can report if it’s installed or running, and remediate with automatic uninstallation or process killing. Additionally you can mark these items as critical issues for finer control over secure access integrations.
After configuring the device policy, additional issue categories will appear in the dashboard and device views.
This article applies to the persistent MetaAccess agent.
This article was last updated on 2017-09-27