User guide
Log Settings
27
installed on the managed machine using the Security > Installation (page 15) page.
Actions
Apply Configuration - Click Apply Configuration to apply the security profile displayed in the Select
Profile drop-down box to selected machine IDs.
Select Profile - Select a security profile to apply to selected machine IDs.
Only display machines with the selected profile - If checked, filters the paging area by the selected
security profile.
Table Columns
Check-in Status - These icons indicate the agent check-in status of each managed machine.
Hovering the cursor over a check-in icon displays the agent quick view window.
Online but waiting for first audit to complete
Agent online
Agent online and user currently logged on.
Agent online and user currently logged on, but user not active for 10 minutes
Agent is currently offline
Agent has never checked in
Agent is online but remote control has been disabled
The agent has been suspended
(Select All Checkbox) - Click this checkbox to select all rows in the paging area. If checked, click this
checkbox to unselect all rows in the paging area.
Machine.Group ID - A unique machine ID / group ID / organization ID name for a machine in the
VSA.
Profile Name - Displays the security profile assigned to a machine ID. Displays the status of the
machine ID if there is a problem.
Log Settings
Security > Log Settings
The Log Settings page specifies the number of days to keep security protection log data for machine IDs
licensed to use Endpoint Security. Certain machines, such as web servers, may warrant maintaining
a longer history of virus attacks then other types of machines.
The list of machine IDs you can select depends on the machine ID / group ID filter and the scope you
are using. To display on this page, machine IDs must have the Endpoint Security client software
installed on the managed machine using the Security > Installation (page 15) page.
Actions
Apply Configuration - Click Apply Configuration to apply the number of days specified in the <N> days
to keep log entries field to selected machine IDs.
<N> days to keep log entries - Enter the number of days to maintain security protection log data.
Table Columns
Check-in Status - These icons indicate the agent check-in status of each managed machine.
Hovering the cursor over a check-in icon displays the agent quick view window.
Online but waiting for first audit to complete
Agent online
Agent online and user currently logged on.
Agent online and user currently logged on, but user not active for 10 minutes