Configuration guide: Shadow IT
Introduction
This library pack helps organizations find and monitor non-compliant applications and web services that could put corporate security at risk or show that the IT setup is not suitable for certain tasks.
Content list and dependency
This library pack contains the following content and dependencies:
Type | Name | Description | Dependencies |
---|---|---|---|
Shadow IT | Helps to find and monitor non-compliant applications and web services that could put corporate security at risk or show that the IT setup is not suitable for certain tasks. | ||
Non-compliant application access warning | Informs users about the use of non-compliant applications and offers compliant alternatives |
Configuration guide
To effectively use this library pack, the content must be installed and configured appropriately. Below are some suggested steps to install and configure the content properly before use.
Step 1) Install library pack content
Go to the Nexthink Library and install all required content.
Step 2) Edit campaigns
Navigate to the manage campaigns administration page to review and edit your campaigns.
For each installed campaign, please ensure to:
Customize the sender name and image.
Review and adjust questions.
Publish the campaign when you are ready to use it.
We recommend the following configurations for this campaign:
Name | Trigger | Priority |
---|---|---|
Non-compliant application access warning | Manual | Urgent |
Usage guide
Your content is now configured and ready to be used. For usage overview and recommendations, you can visit the usage guide:
Last updated