- Using dashboards
- Managing alerts across Cylance Endpoint Security services
- Managing users, devices, and groups
- Manage CylancePROTECT Desktop and CylanceOPTICS devices
- Manage zones
- Manage devices with the CylancePROTECT Mobile app
- Manage CylancePROTECT Mobile app and CylanceGATEWAY users
- View CylanceAVERT user details
- Manage user groups
- Configure device lifecycle management
- View a list of applications installed on CylancePROTECT Desktop devices
- Remove a registered FIDO device for a user account
- Discover unprotected devices
- Managing threats detected by CylancePROTECT Desktop
- Managing threats detected by CylancePROTECT Mobile
- Managing safe and unsafe lists for CylancePROTECT Desktop and CylancePROTECT Mobile
- Add a file to the CylancePROTECT Desktop global quarantine or global safe list
- Add a file to the CylancePROTECT Desktop local quarantine or local safe list
- Add a certificate to the CylancePROTECT Desktop global safe list
- Add an app, certificate, IP address, domain, or installer source to the CylancePROTECT Mobile safe or restricted list
- Analyzing data collected by CylanceOPTICS
- Using CylanceOPTICS to detect and respond to events
- Monitoring network connections with CylanceGATEWAY
- Monitoring sensitive files with CylanceAVERT
- View mobile OS vulnerabilities
- Auditing administrator actions
- Managing logs
- Send events to a SIEM solution or syslog server
- Enable access to the Cylance User API
- Troubleshooting Cylance Endpoint Security
- Using the BlackBerry Support Collection Tool
- Using the Report a problem feature
- Removing the BlackBerry Connectivity Node software from Cylance Endpoint Security
- Troubleshooting CylancePROTECT Desktop
- Remove the CylancePROTECT Desktop agent from a device
- Re-register a Linux agent
- Troubleshoot update, status, and connectivity issues with CylancePROTECT Desktop
- A large number of DYLD Injection violations are reported by Linux devices
- Time zone variances for CylancePROTECT Desktop
- Folder exclusions when using CylancePROTECT Desktop with third-party security products
- Linux driver is not loaded. Upgrade the driver package.
- Troubleshooting CylanceOPTICS
- BlackBerry Docs
- Cylance Endpoint Security
- Administration
- Cylance Endpoint Security Administration Guide
- Managing users, devices, and groups
- View a list of applications installed on CylancePROTECT Desktop devices
View a list of applications installed on CylancePROTECT Desktop devices
CylancePROTECT Desktop
devicesThe
CylancePROTECT Desktop
agent version 3.2 reports a list of software applications that are installed on the device to the console. This feature allows you to identify applications that are installed on devices that may be a source of vulnerabilities, prioritize actions against vulnerabilities, and manage them accordingly. You can view all applications that are installed on the devices and also view a list of applications that are installed on individual devices. This feature can be enabled from the device policy.- Devices must be runningCylancePROTECT Desktopagent version 3.2 or later on aWindowsdevice to report a list of applications to the console.
- Devices must be assigned a device policy with the software inventory feature turned on.
- Do one of the following:TaskStepsView a list of all applications installed on devices in your tenant
- In the console, go toAssets > Installed Applications.
- Click on an application name to view a list of devices that have it installed. You can click on a device name to view the device details, including a list of applications that are installed on the device.
View a list of applications installed on an individual device- In the console, go toAssets > Devices.
- Click on a device name.
- In theThreats & activitiessection, click theInstalled Applicationstab.