About How Application Metering Works; About Blacklisting Applications - Symantec ALTIRIS INVENTORY SOLUTION 7.0 SP2 - V1.0 Manual

Hide thumbs Also See for ALTIRIS INVENTORY SOLUTION 7.0 SP2 - V1.0:
Table of Contents

Advertisement

88
Metering and denying applications

About how application metering works

About how application metering works

About blacklisting applications

Caution: When you use Application Metering policies, it is possible for multiple
policies to monitor the same application. This situation might cause erroneous
data in reports or trigger duplicate notification policy actions.
The rules for metering applications are controlled through Notification Server
polices. The Application Metering plug-in, which runs with the Altiris Agent on
the target computer, enforces the properties of the policy. An Application Metering
policy can meter one or more applications.
See
"About metering and denying applications"
When an application starts on a managed computer, the Application Metering
plug-in checks for an enabled policy monitoring the application.
If the plug-in finds an enabled policy, it does the following functions:
Records the application summary data locally and sends this data to the CMDB
at the end of the application monitoring period
Sends the event notifications to the CMDB as specified in the monitoring policy.
It can send application start, stop, or denial events. It sends this information
in batches at a specified interval.
Denies the use of the application if the monitoring policy so specifies.
Blacklisting is an application metering feature that lets you deny multiple
applications from running on client computers.
See
"About metering and denying applications"
Blacklisting is performed by configuring the Blacklisted Applications policy. This
policy is a predefined policy. You can add as many applications to this policy as
you want. You can also add applications the Blacklisted Applications policy through
right-clicking an application in the Software Catalog.
When you blacklist any software component, the software component is scanned
looking for an exe file. If that software component contains any exe, it is
blacklisted. A separate rule is created for every exe.
If the software component is successfully blacklisted, the following message is
displayed in a dialog:
"The following software has been successfully marked as blacklisted."
on page 85.
on page 85.

Advertisement

Table of Contents
loading

Table of Contents