Red Canary maintains an inventory of products and tracks their execution throughout your organization. These are products that we either classify as Unwanted Software or that are unauthorized for specific users or for your entire organization. You can view and edit these products as needed.
This page enables you to choose for which applications Red Canary should trigger threats and which should be exempted.
- From the navigation menu, click the Analytics dropdown, and then click Applications. A sortable table with a search bar displays.
- Use the search bar to filter applications, or sort using the table columns.
- Each row in the table offers a short description with a dropdown arrow. Click the dropdown arrow for the application in which you are interested. A new window displays that enables you to customize whether a product is classified as unwanted software.
- Follow the directions on the screen, then click Save.
Supported search types
Endpoint searches — Red Canary supports filtering by specific reporting tags as well as by endpoint host names, including exact matching and Unix-like glob pattern matching.
Specific user names and domains — User names and domains can be filtered through exact matching or Unix-like glob pattern matching.
Check out the Red Canary platform for details and examples.
Please sign in to leave a comment.