Reference Guide

Navigate the Dell Server
78
Advanced Threat Events - Click Advanced Threat Events view, export, quarantine, or waive unsafe
files. Events are grouped by Status (unsafe, quarantined, or abnormal), and the following information is
displayed for events: file name, file paths, score, classification, first found time stamp, running, auto run,
and detected by.
6. If modified, click Save.
View Effective Policy
When you view Effective Policies, you are viewing the policies and settings that are enforced on an
endpoint.
1. In the left pane, click Populations > Endpoints.
2. Click a hostname in the list or enter a filter to search for available endpoints. The wildcard
character (*) is supported.
For Windows and Mac, if you know the endpoint hostname, enter it in Search. Leave the field blank to
display all Windows and Mac endpoints.
For Mobile devices, optionally enter the model name or user's email address.
Click a hostname or endpoint serial number to display the Endpoint Detail page.
3. On the Endpoint Detail page, click the Details & Actions tab.
4. Under Manager Detail, click View Effective Policies.
Related topics:
Manage Security Policies
Endpoint Details & Actions
The Details & Actions page lists the details for the selected endpoint as well as commands, such as
Remove Endpoint. Available details and commands vary, depending on the endpoint platform.
To access Endpoint Details & Actions, follow these steps:
1. In the left pane, click Populations > Endpoints.
2. Search or select a hostname, then the Details & Actions tab.
Endpoint Detail
Command:
Remove - Endpoint is removed.
Endpoint removal is permanent. Once an endpoint is removed, the action cannot be undone.
Details:
Windows
Category - Windows
OS/Version - Example: Microsoft Windows 10 Enterprise
Processor
Serial Number - Manufacturer assigned serial number