Reference Guide
Security Management Server Virtual v10.2.7 AdminHelp
v
View or Modify Endpoint Policies and Information .................................................................................. 75
View Effective Policy ............................................................................................................................... 76
Endpoint Details & Actions ....................................................................................................................... 76
Endpoint Detail ..................................................................................................................................... 76
Shield Detail ......................................................................................................................................... 78
Manager Detail (Windows only) ............................................................................................................ 80
States .................................................................................................................................................... 80
Threat Protection Detail (Windows only) ............................................................................................. 82
Advanced Threat Prevention Detail ..................................................................................................... 82
Cloud Device Control ............................................................................................................................ 82
FDE Device Control (Windows only) ..................................................................................................... 82
PBA Device Control (Windows only) ..................................................................................................... 83
Protected Status ....................................................................................................................................... 84
Endpoint Users ......................................................................................................................................... 84
Shield .................................................................................................................................................... 84
Cloud ..................................................................................................................................................... 85
Endpoint Threat Events ............................................................................................................................ 85
Endpoint Advanced Threats ..................................................................................................................... 86
List of Events ........................................................................................................................................ 86
Configure the Threat List ..................................................................................................................... 86
Export ................................................................................................................................................ 87
Quarantine ........................................................................................................................................ 87
Waive................................................................................................................................................. 87
Exploit Attempts ................................................................................................................................... 87
Endpoint Advanced Threat Events ........................................................................................................... 88
Server Encryption Clients ......................................................................................................................... 88
Suspend an Encrypted Server ............................................................................................................... 88
Reinstate an Encrypted Server ............................................................................................................. 89
Commands for Self-Encrypting Drives ...................................................................................................... 89
Priority of Commands for Self-Encrypting Drives ................................................................................. 89
Allow PBA Login Bypass ........................................................................................................................ 90
Unlock a Self-Encrypting Drive ............................................................................................................. 90
Remove Users from Endpoint with Self-Encrypting Drive .................................................................... 90
Lock a Self-Encrypting Drive................................................................................................................. 91










