Viewing discovered applications

Select
Discovered Items > Applications
to view the applications that are discovered on all your devices. See:
Application discovery runs once every 24 hours. You might need to wait a period of time before new data appears in the cloud console. New data might be a new application, different application version, or the count of devices on which an application appears.
The following KPIs show the change in the environment. Select a KPI to filter the list.
KPI
Description
Total Apps
Shows the total number of applications in your environment that has been discovered.
Vulnerable Apps
Application Isolation only
Shows the list of applications whose vulnerability score is greater than 7.
At Risk
Shows the list of applications whose vulnerability score is greater than 7 and protection coverage is less than 80 percent.
You can view the details of an application and manage any application from the application list.
You can customize the column list to change the view. Open the menu next to the column count and select
Customize Columns
. You can also export the application list data. See:
You can take action on files in the
Applications
list. Select the application, then select the three-dot menu to the right of selection, and choose the action from the drop-down menu. You can select multiple applications. You can also take action on an application version. Select the application to view its details, and then select the
Versions
tab.
Action
Description
Apply Exploit Prevention
Adds the application to an Exploit Prevention policy. See:
Allow
Adds an allow rule for the selected applications to an Application Control policy. You can also add an allow rule for a particular version of an application.
Block
Adds a block rule for the selected applications to an Application Control policy. You can also add a block rule for a particular version of an application.
Make Trusted Updater
Adds the selected applications as trusted updaters. See:
Select
Discovered Items > Files
to view applications from all devices that generate Intensive Protection events. See: