Skip to main content

Application lifecycle

Use the Application lifecycle dashboard in Risk Monitor to get an overview of the lifecycles of the applications in your IT estate.

Description

You can for example identify applications that have reached end of support and therefore should be upgraded or removed, or monitor applications that are about to go out of support so that they can be upgraded as a preventive measure.

Select one of the following lifecycle options from the list to the upper left of the dashboard, depending on what aspect you want to focus on:

  • End of support: The dashboard will show information about applications in your IT estate with known end-of-support dates.

  • End of life: The dashboard will show information about applications in your IT estate with known end-of-life dates.

  • End of extended support: The dashboard will show information about applications in your IT estate with known end-of-extended support dates.

Note

Risk Monitor does not filter information based on your organization's agreements for extended support. An application will appear in the End of support and End of extended support views regardless of whether there is an agreement for extended support or not.

The chart [Lifecycle option] timeline shows the number of applications in your organization that has reached end of support/end of life/end of extended support (red), as well as applications that have not reached end of support/end of life/end of extended support (blue). The horizontal axis shows what year the end date occurred or will occur.

Use the Applications with [Lifecycle option] within 12 months table to see what applications are next in line to reach end of support/end of life/end of extended support.

Look up an application in the Application details table to see lifecycle details, such as if the application has reached end of support, if upgrades are available, and links to available upgrade paths.

You can filter the data to focus on the lifecycles of a specific subset of applications in your organization. All key figures, charts, and tables will adjust to show the results filtered by the selected parameter. Use the filters to focus on, for example:

  • A specific application.

  • Vulnerable applications.

  • Applications that may contain personally identifiable information.

  • Applications used by a certain department in the organization.

Related use cases

Characteristics

You can refer to the tables below for descriptions of the key figures, filters, charts, and tables on the dashboard.

Key figures

The key figures give a quick overview of how your IT estate is affected by the application lifecycles.

Key figure

Description

Applications affected

The number of applications having reached end of support/end of life/end of extended support.

Devices affected

The number of devices with one or more affected applications.

Users affected

The number of users with access to one or more affected devices.

Applications affected in 12 months

The number of applications that will reach end of support/end of life/end of extended support within 12 months.

Filters

Use one or more filters to focus on certain aspects of the application lifecycles. All the key figures, charts and tables on the page will adjust to show the results filtered by the selected parameter or parameters.

Filter

Description

Application name

Select an application from the list to see lifecycle information for that application.

If there is no end of life/end of support/end of extended support date available for the application, the page will show blank results.

PII risk

Select True to see lifecycle information for applications that are designed to hold personally identifiable information.

Select False to see lifecycle information for applications that do not hold personally identifiable information.

Organization

Select an organizational unit from the list to see lifecycle information for the applications used by that organizational unit.

Vulnerable application

Select True to see lifecycle information for applications containing vulnerabilities.

Select False to see lifecycle information for applications without vulnerabilities.

Charts

Use the chart to get an overview of the number of applications in your organization that reached, or will reach, end of support/end of life/end of extended support per year.

Chart

Description

[Lifecycle option] timeline

Each bar in the chart shows the number of applications in your IT estate that reached (red), or will reach (blue), end of support/end of life/end of extended support a specific year.

Tip: Select a bar for a certain year to focus on the applications that reached end of support/end of life/end of extended support that year. The Application details table will list details about the applications, such as whether they can be upgraded or not, and available upgrade paths.

Tables

Use the table to look up details about the lifecycles of applications in the IT estate.

Select a column header to sort the table by that column.

Table

Description

Applications with [lifecycle option] within 12 months

Lists all applications in your IT estate that will reach end of support/end of life/end of extended support within the next twelve months, together with the end date for each application.

Application details

Lists the following details about each application in your IT estate:

  • Application name: The name of the application.

  • Vulnerable application: If the application contains any vulnerabilities or not.

  • PII risk: If the application is designed to hold personally identifiable information or not.

  • End of life: The date the application reaches end of life.

  • End of support: The date the application reaches end of support.

  • End of extended support: The date the application reaches end of extended support.

  • Upgradeable: If upgrades for the application are available or not.

  • Upgrade Paths: Available upgrade paths, if any.

  • Inventoried devices: The number of devices with the application installed.

  • Inventoried users: The number of users having access to the application.

Tip: Select a start and end date in the upper-right corner of the table to filter on applications with end of support/end of life/end of extended support dates within the selected dates.

Tip: Right-click an application and then select Drill through > List vuln. by device(s) and application(s) to see a list of all devices with the application installed. The list can be used to determine if the application should be upgraded or uninstalled for each device.