Reference Guide

Security Management Server v10.2.7 AdminHelp
45
Note: Occasionally, a file may be classified as Unsafe or Abnormal even though the score displayed doesn’t
match the range for the classification. This could result from updated findings or additional file analysis after the
initial detection. For the most up-to-date analysis, enable Auto Upload in the Device Policy.
Priority Level
The file is given a priority level. The priority level helps administrators determine which threats and
devices to address first. For more information, see Advanced Threats by Priority
.
Advanced Threats Top Ten
Click Threats to view the threats found on the largest number of devices.
Click a threat to display additional information about the threat. Details display on a new page.
Click Devices to view a list of devices that have the largest number of threats.
Click a device to display additional information about the device. Details display on a new page.
Endpoint Protection History
This graph gives a time line snapshot of the past 90 days of the total number of endpoints that are
protected and total number that are not protected. This graph is especially useful during initial
deployment, when moving toward complete protection.
The green bars represent the total number of protected endpoints. The red bars represent the total
number of endpoints that are not protected.
Endpoint Inventory History
This graph gives a time line snapshot of the past 90 days of the total number of endpoints that have
communicated with and sent inventory to the Dell Server and the total number that have not sent
inventory.
Summary Statistics
Summary Statistics provides a breakdown of the following:
Domains
User groups
Endpoint groups
AD users
Local users
Endpoints
Protected
Not protected
Shields
Managers