Reference Guide
Security Management Server v10.2.7 AdminHelp
v
Remove Endpoints from an Admin-Defined Endpoint Group ................................................................ 75
Endpoints ..................................................................................................................................................... 75
Endpoints .................................................................................................................................................. 75
Add Endpoint to Group ......................................................................................................................... 76
Remove Endpoints ................................................................................................................................ 76
Find Endpoints .......................................................................................................................................... 77
View or Modify Endpoint Policies and Information .................................................................................. 77
View Effective Policy ............................................................................................................................... 78
Endpoint Details & Actions ....................................................................................................................... 78
Endpoint Detail ..................................................................................................................................... 78
Shield Detail ......................................................................................................................................... 80
Manager Detail (Windows only) ............................................................................................................ 82
States .................................................................................................................................................... 82
Threat Protection Detail (Windows only) ............................................................................................. 84
Advanced Threat Prevention Detail ..................................................................................................... 84
Cloud Device Control ............................................................................................................................ 84
FDE Device Control (Windows only) ..................................................................................................... 85
PBA Device Control (Windows only) ..................................................................................................... 85
Protected Status ....................................................................................................................................... 86
Endpoint Users ......................................................................................................................................... 86
Shield .................................................................................................................................................... 86
Cloud ..................................................................................................................................................... 87
Endpoint Threat Events ............................................................................................................................ 87
Endpoint Advanced Threats ..................................................................................................................... 88
List of Events ........................................................................................................................................ 88
Configure the Threat List ..................................................................................................................... 88
Export ................................................................................................................................................ 89
Quarantine ........................................................................................................................................ 89
Waive................................................................................................................................................. 89
Exploit Attempts ................................................................................................................................... 89
Endpoint Advanced Threat Events ........................................................................................................... 90
Server Encryption Clients ......................................................................................................................... 90
Suspend an Encrypted Server ............................................................................................................... 90
Reinstate an Encrypted Server ............................................................................................................. 91










