Users can now request access to unmanaged applications while in strict mode. This acts as a bridge by offering access only to applications that are explicitly requested. Upon requesting access, the sysadmins will be notified of the same via mail, containing the application details and the business justification as raised by the user.
It helps increase productivity of both the sysadmin and the users by enabling users to request access and administrators to qualify these applications based on the justification provided by the user.
Advantages of Request Access
Refer this link to know how to enable and utilize request access.
Opt for customizable application control by downloading Application Control Plus. Try it free for 30 days, and see how it can help your organization secure its applications!