- 19 Nov 2025
- 1 Minute to read
- Print
- PDF
Administrator
- Updated on 19 Nov 2025
- 1 Minute to read
- Print
- PDF
The Admin serves as the system configurator and policy enforcer, setting up foundational elements like profiles, mappings, return types, and dynamic endpoints to govern asset lifecycle, security, and access controls. They create and update profiles for application restrictions (allow/warn/block), map them to users, systems, locations, and IP ranges, and configure custom messages for compliance notifications during installations or movements. With responsibilities spanning endpoint automation via registry/WMI/CMD checks and asset return categorizations, they ensure seamless integration of scanned/discovered assets while maintaining audit-ready masters. By enabling default/master profiles and logging options, they proactively mitigate risks like unauthorized software or discrepancies in high-volume environments. Ultimately, the Admin builds a secure, scalable framework that empowers analysts and approvers, driving operational efficiency and regulatory adherence across tenants and departments.
An Admin performs the following:
Endpoint Automation
Asset Return Type
Application Control
Endpoint Compliance
Configuration