Reference Guide
Navigate the Dell Server
86
Wipe - The Wipe command functions as a “restore to factory state” for the SED drive. The Wipe
command can be used to re-purpose a computer or, in an emergency situation, wipe the computer,
making the data permanently unrecoverable. When the wipe command is consumed by the client, all
history and details about this endpoint are removed from the Dell Server. Ensure that this is the desired
behavior before invoking this command.
The PBA Device Control
Lists the commands most recently sent to the PBA device.
To sort, click a column header.
Protected Status
Protected status is indicated if any of the following criteria are met:
• Advanced Threat Prevention is installed and enabled.
• Data Guardian is installed and enabled.
• Self-Encrypting Drive Management is installed, enabled, and the PBA is enabled.
• BitLocker Manager is installed, enabled, and encryption has completed.
• Dell Encryption (Mac) is installed and enabled, and policy-based encryption has been enforced.
• Dell Encryption (Windows) is installed, enabled, Policy-Based Encryption has been set for the
endpoint, and the most recent policy has been applied for the last logged on user.
To check Protected Status of an endpoint:
1. In the left pane, click Populations > Endpoints.
2. Click a hostname in the list or enter a filter to search for available endpoints. The wildcard
character (*) is supported.
For Windows and Mac, if you know the endpoint hostname, enter it in the Search field. Leave
the field blank to display all Windows and Mac endpoints.
For Mobile devices, optionally enter the model name or user's email address.
Click a hostname or endpoint serial number to display the Endpoint Detail page.
3. A green check mark displays in the Protected column if any of the criteria for Protected status
are met.
Endpoint Users
This page displays information for every user of the specified endpoint. The user information differs for each
technology group or policy category.
1. In the left pane, click Populations > Endpoints.
2. Search or select a hostname, then the Users tab.
Shield
User - Each user on the specific endpoint
Last Successful Login - Date/time stamp, per user
Last Unsuccessful Login - Date/time stamp, per user