Reference Guide
Security Management Server v10.2.7 AdminHelp
77
For Windows and Mac, if you know the hostname of the endpoint, enter it in Search. Leave the field
blank to display all Windows and Mac endpoints.
For Mobile devices, optionally enter the model name or user's email address.
4. At the top left, click Remove.
5. Click OK to confirm removal of the endpoint.
As another option, click an endpoint and select the Details & Actions tab. Under Endpoint Detail, click
Remove.
Find Endpoints
1. In the left pane, click Populations > Endpoints.
2. Navigate the list of endpoints using the scroll bar or page navigation controls at the bottom of
the page or enter a filter into Search to search for available endpoints. The wildcard character
(*) is supported.
For Windows and Mac, if you know the endpoint hostname, enter it in Search. Leave the field blank to
display all Windows and Mac endpoints.
For Mobile devices, optionally enter the model name or user's email address.
View or Modify Endpoint Policies and Information
1. In the left pane, click Populations > Endpoints.
2. Select the appropriate endpoint type, for example, Workstation or Mobile Device.
3. Click a hostname in the list or enter a filter to search for available endpoints. The wildcard
character (*) is supported.
For Windows and Mac, if you know the endpoint hostname, enter it in Search. Leave the field blank to
display all Windows and Mac endpoints.
For Mobile devices, optionally enter the model name or user's email address.
Click a hostname or endpoint serial number to display the Endpoint Detail page.
4. Click the tab that corresponds with the action to perform:
Security Policies - Click Security Policies to view or modify policies of the endpoint.
Details & Actions - Click Details & Actions to view properties of the endpoint, including
Inventory Information. Viewable information includes hardware information, effective policies,
inventory and protection status, threat protection and Advanced Threat Prevention detail, and
SED Device Control commands.
Users - Click Users to view a list of users who store and access data on the endpoint. These statistics
of users may be available on the Endpoint Detail page: login, last Gatekeeper sync, effective policies,
and states. You can also recover data from this page.
Endpoint Groups - Click Endpoint Groups to view a list of Endpoint Groups to which this endpoint
belongs. All endpoint belong to at least one endpoint group, the Default Endpoint Group.
Threat Events - Click Threat Events view information about threat events on the endpoint. The
following information is displayed for events: severity, category (malware, web filtering, web protection,
and firewall), event ID, event description, user name, and received.