Reference Guide

Security Management Server v10.2.11 AdminHelp
Remove Endpoints from an Admin-Defined Endpoint Group ................................................................ 75
Endpoints ..................................................................................................................................................... 75
Endpoints .................................................................................................................................................. 75
Add Endpoint to Group ......................................................................................................................... 76
Remove Endpoints ................................................................................................................................ 76
Find Endpoints .......................................................................................................................................... 76
View or Modify Endpoint Policies and Information .................................................................................. 76
View Effective Policy ............................................................................................................................... 77
Endpoint Details & Actions ....................................................................................................................... 78
Endpoint Detail ..................................................................................................................................... 78
Shield Detail ......................................................................................................................................... 78
Manager Detail (Windows only) ............................................................................................................ 81
States .................................................................................................................................................... 81
Threat Protection Detail (Windows only) ............................................................................................. 83
Advanced Threat Prevention Detail ..................................................................................................... 83
FDE Device Control (Windows only) ..................................................................................................... 83
PBA Device Control (Windows only) ..................................................................................................... 84
Protected Status ....................................................................................................................................... 84
Endpoint Users ......................................................................................................................................... 85
Shield .................................................................................................................................................... 85
Endpoint Threat Events ............................................................................................................................ 85
Endpoint Advanced Threats ..................................................................................................................... 86
List of Events ........................................................................................................................................ 86
Configure the Threat List ..................................................................................................................... 87
Export ................................................................................................................................................ 87
Quarantine ........................................................................................................................................ 87
Waive................................................................................................................................................. 87
Exploit Attempts ................................................................................................................................... 87
Endpoint Advanced Threat Events ........................................................................................................... 88
Server Encryption Clients ......................................................................................................................... 89
Suspend an Encrypted Server ............................................................................................................... 89
Reinstate an Encrypted Server ............................................................................................................. 89
Commands for Self-Encrypting Drives ...................................................................................................... 89
Priority of Commands for Self-Encrypting Drives ................................................................................. 89
v