Reference Guide
Security Management Server v10.2.11 AdminHelp
The file is given a priority level. The priority level helps administrators determine which threats and
devices to address first. For more information, see Advanced Threats by Priority
.
Advanced Threats Top Ten
Click Threats to view the threats found on the largest number of devices.
• Click a threat to display additional information about the threat. Details display on a new page.
Click Devices to view a list of devices that have the largest number of threats.
• Click a device to display additional information about the device. Details display on a new page.
Endpoint Protection History
This graph gives a time line snapshot of the past 90 days of the total number of endpoints that are
protected and total number that are not protected. This graph is especially useful during initial
deployment, when moving toward complete protection.
The green bars represent the total number of protected endpoints. The red bars represent the total
number of endpoints that are not protected.
Endpoint Inventory History
This graph gives a time line snapshot of the past 90 days of the total number of endpoints that have
communicated with and sent inventory to the Dell Server and the total number that have not sent
inventory.
Summary Statistics
Summary Statistics provides a breakdown of the following:
Domains
User groups
Endpoint groups
AD users
Local users
Endpoints
Protected
Not protected
Shields
Managers
Modified policies
Summary Statistics provides a breakdown of endpoints by platform, with a link to a detailed report for
the selected platform:
Windows
45