Unsanctioned Application Detection
Preventing devices with unsanctioned applications from accessing your cloud assets
The potentially unwanted application CleanUp Module , formerly known as AppRemover, detects, remediates, and cleans up applications and files that cause security risks and use excessive memory. Security risks often come from Potentially Unwanted Applications (PUAs), which can be a backdoor for vulnerabilities. The CleanUp Module lets you build remediation features that can terminate or uninstall running software.
Learn more of Cloud Access Control's capabilities by downloading the datasheet
Applications that rely on certain files and registry settings can become non-functional or unremovable if any of those files or settings are missing or corrupted. Additionally rogue applications such as browser search bars can be unintentionally installed by users seeking to download and install legitimate applications. Removing such applications can be difficult due to password protection, incomplete removal by the application's own uninstaller, or forced end user interaction. The Application CleanUp Module provides an easy way to terminate or remove applications and clean up files from your disk.
The CleanUp Module improves endpoint security and performance by automating the application cleanup process for difficult-to-uninstall applications and their associated files not removed by native uninstallers. Such applications can include toolbars, public file sharing applications, cloud storage software, anti-malware products, and other programs with known vulnerabilities.
Supported CleanUp features for applications include:
- Potentially Unwanted Applications (PUAs) that:
- expose sensitive endpoint information without informed consent of the user
- Well-known vulnerable applications like:
- Java, Adobe, browsers, and other popular office software
- Anti-malware applications that:
- Stop functioning or slow system performance when any required files or settings are removed or become corrupted
- Employ security features such as password protection to prevent automated removal
Supported Operating Sytems
CleanUp Module Benefits and Use Cases
Certain commonly used applications, like Java, Adobe Flash Player, and browsers such as Internet Explorer and Chrome, have many known vulnerabilities. When a system upgrade or data transport is needed, users may want to temporarily disable or even uninstall these programs to limit their exposure to known vulnerabilities. For this use case, the application cleanup module offers the ability to report, manage, and remediate vulnerable applications.
Software like browser toolbars, public file sharing programs, botware, adware, and backup or cloud sync applications may be labeled as PUAs that need to be removed from endpoints. Cloud Access Control provides APIs to detect, classify, and remove these applications.
Optimize System Performance
Incompatible or non-standard anti-malware applications may need to be removed prior to installing applications for corporate-wide use. Additionally, redundant security applications may need to be uninstalled to better utilize system performance and disk space. Cloud Access Control makes it easy to perform these uninstallations without input from the end users.
The Application Cleanup Module silently removes anti-malware, vulnerable applications, and potentially unwanted applications without requiring any user interaction.
Ability to Bypass Self-Protection & Password Protection
The module silently and automatically removes password protection applications without user intervention by deleting hidden files.
Clean Up Leftover Application Footprints From Previously Failed Uninstallations
The Application CleanUp Module can also remove applications that previously failed to uninstall or left traces in the system.