Features>Application control

Application control and privilege management

Application allowlist and blocklist

Allowlisting and blocklisting are the two approaches you can take to have control over applications in your network. If you opt for allowlisting, you'll need to create a list of allowable applications, while all other applications will be blocked from running in the network. On the other hand, with blocklisting, you'll need to create a list comprising the applications you wish to block. Use allowlisting to keep applications in check and tighten security, and use blocklisting to maintain productivity.

Here are the benefits to application control in Endpoint Central MSP:

  • Enhanced security

    Allowlisting and blocklisting serve as robust security measures, reducing the attack surface by allowing only trusted applications. This significantly lowers the risk of cyberthreats.

  • Efficient resource management

    By allowing applications based on a user's role and job requirements, application control streamlines inventory management, prevents unused applications from consuming storage, and simplifies license and patch management.

  • Reduced support tickets

    By controlling application usage, MSPs can minimize issues related to incompatible or malicious software, leading to fewer support tickets

  • Customized access

    Application allowlisting allows MSPs to tailor application access according to user roles, also ensuring MSPs can cater to wide range of client requirements.

  • Unauthorized application prohibition

    Application blocklisting involves identifying and restricting unauthorized, risky, or malicious applications from running on managed devices.

  • Reduced attack surface

    Blocklisting acts as a protective measure against known security threats by prohibiting applications with potential vulnerabilities.

  • Control and compliance

    Blocklisting offers MSPs control over which applications are permitted, thus maintaining compliance with security policies.

Application privilege management

  • Client-wide admin rights restriction

    Implement a security practice to reduce unnecessary admin rights, limiting the potential attack surface and preventing privilege elevation or credential compromise attacks.

  • Least privilege model

    Maintain a least privilege model without hindering your clients' day-to-day operations, ensuring that users only have the access they require to perform their roles effectively.

  • Application-specific privilege elevation

    Enable controlled privilege elevation for business-critical applications, allowing users to access elevated privileges only when needed for specific tasks, strengthening security without disrupting workflows.

  • Just-in-time access

    Address interim user needs by providing just-in-time privileged access to applications with an automatic revocation mechanism after a predefined period, minimizing security risks associated with extended privileges.

  • Per-app VPN

    Implement secure connections with granular control, ensuring data in transit is protected for individual applications and optimizing network resources.

  • Conditional access

    Restrict network and application access based on user identity, device health, or location, enhancing security by allowing access only when predefined conditions are met.

  • Enhancing Office 365 security

    Gain visibility into the devices accessing the Office 365 applications and grant access only from authorized devices.

Success stories

"[With Endpoint Central MSP] we have great visibility of our different customers' fleets. The functionalities offered by ManageEngine are ultra interesting and successful, allowing us to optimize our time on many tasks, like patch deployment, software, etc."

- Julien B,

Support technician.

Remote Desktop & Mobile Device Management Software for MSPs trusted by

Back to Top