Application lifecycle
Use the Application lifecycle dashboard in Risk Monitor to get an overview of the lifecycles of the applications in your IT estate.
Description
You can for example identify applications that have reached end of support and therefore should be upgraded or removed, or monitor applications that are about to go out of support so that they can be upgraded as a preventive measure.
Select one of the following lifecycle options from the list to the upper left of the dashboard, depending on what aspect you want to focus on:
-
End of support: The dashboard will show information about applications in your IT estate with known end-of-support dates.
-
End of life: The dashboard will show information about applications in your IT estate with known end-of-life dates.
-
End of extended support: The dashboard will show information about applications in your IT estate with known end-of-extended support dates.
Risk Monitor does not filter information based on your organization's agreements for extended support. An application will appear in the End of support and End of extended support views regardless of whether there is an agreement for extended support or not.
The chart [Lifecycle option] timeline shows the number of applications in your organization that has reached end of support/end of life/end of extended support (red), as well as applications that have not reached end of support/end of life/end of extended support (blue). The horizontal axis shows what year the end date occurred or will occur.
Use the Applications with [Lifecycle option] within 12 months table to see what applications are next in line to reach end of support/end of life/end of extended support.
Look up an application in the Application details table to see lifecycle details, such as if the application has reached end of support, if upgrades are available, and links to available upgrade paths.
You can filter the data to focus on the lifecycles of a specific subset of applications in your organization. All key figures, charts, and tables will adjust to show the results filtered by the selected parameter. Use the filters to focus on, for example:
-
A specific application.
-
Vulnerable applications.
-
Applications that may contain personally identifiable information.
-
Applications used by a certain department in the organization.
Related use cases
For information on related use cases, see the following sections:
Characteristics
You can refer to the tables below for descriptions of the key figures, filters, charts, and tables on the dashboard.
Key figures
The key figures give a quick overview of how your IT estate is affected by the application lifecycles.
Key figure | Description |
---|---|
Applications affected | The number of applications having reached end of support/end of life/end of extended support. |
Devices affected | The number of devices with one or more affected applications. |
Users affected | The number of users with access to one or more affected devices. |
Applications affected in 12 months | The number of applications that will reach end of support/end of life/end of extended support within 12 months. |
Filters
Use one or more filters to focus on certain aspects of the application lifecycles. All the key figures, charts and tables on the page will adjust to show the results filtered by the selected parameter or parameters.
Filter | Description |
---|---|
Application name | Select an application from the list to see lifecycle information for that application. If there is no end of life/end of support/end of extended support date available for the application, the page will show blank results. |
PII risk | Select True to see lifecycle information for applications that are designed to hold personally identifiable information. Select False to see lifecycle information for applications that do not hold personally identifiable information. |
Organization | Select an organizational unit from the list to see lifecycle information for the applications used by that organizational unit. |
Vulnerable application | Select True to see lifecycle information for applications containing vulnerabilities. Select False to see lifecycle information for applications without vulnerabilities. |
Charts
Use the chart to get an overview of the number of applications in your organization that reached, or will reach, end of support/end of life/end of extended support per year.
Chart | Description |
---|---|
[Lifecycle option] timeline | Each bar in the chart shows the number of applications in your IT estate that reached (red), or will reach (blue), end of support/end of life/end of extended support a specific year. Tip: Select a bar for a certain year to focus on the applications that reached end of support/end of life/end of extended support that year. The Application details table will list details about the applications, such as whether they can be upgraded or not, and available upgrade paths. |
Tables
Use the table to look up details about the lifecycles of applications in the IT estate.
Select a column header to sort the table by that column.
Table | Description |
---|---|
Applications with [lifecycle option] within 12 months | Lists all applications in your IT estate that will reach end of support/end of life/end of extended support within the next twelve months, together with the end date for each application. |
Application details | Lists the following details about each application in your IT estate:
Tip: Right-click an application and then select Drill through > List vuln. by device(s) and application(s) to see a list of all devices with the application installed. The list can be used to determine if the application should be upgraded or uninstalled for each device. |