Application inventory
Understand all applications running in your environment, and search to see versions, hosts and users
Pinpoint unprotected and unmanaged applications that may pose a risk
Manage non-compliance and license costs by tracking application usage
Identify potentially suspicious apps in your network
Explore detailed inventory of managed and rogue systems, and see which assets could easily be covered by the Falcon agent
Gain clarity via BitLocker to see which hosts are encrypted
Monitor asset inventory to help achieve, maintain and prove compliance requirements
See who’s on your network at all times
Track use of administrator credentials to detect if they’re being used inappropriately
Monitor log-on time trends and session length to identify unusual behavior
Assess password update timelines to improve security and compliance.