Configuration guide: Shadow IT

Introduction

This library pack helps organizations find and monitor non-compliant applications and web services that could put corporate security at risk or show that the IT setup is not suitable for certain tasks.

Content list and dependency

This library pack contains the following content and dependencies:

Type
Name
Description
Dependencies

Shadow IT

Helps to find and monitor non-compliant applications and web services that could put corporate security at risk or show that the IT setup is not suitable for certain tasks.

Non-compliant application access warning

Informs users about the use of non-compliant applications and offers compliant alternatives

Configuration guide

To effectively use this library pack, the content must be installed and configured appropriately. Below are some suggested steps to install and configure the content properly before use.

Step 1) Install library pack content

Go to the Nexthink Library and install all required content.

Step 2) Edit campaigns

Navigate to the manage campaigns administration page to review and edit your campaigns.

For each installed campaign, please ensure to:

  • Customize the sender name and image.

  • Review and adjust questions.

  • Publish the campaign when you are ready to use it.

We recommend the following configurations for this campaign:

Name
Trigger
Priority

Non-compliant application access warning

Manual

Urgent

Usage guide

Your content is now configured and ready to be used. For usage overview and recommendations, you can visit the usage guide:

Usage guide: Shadow it

Last updated