Reference Guide
Security Management Server Virtual v10.2.11 AdminHelp
View or Modify Endpoint Policies and Information .................................................................................. 74
View Effective Policy ............................................................................................................................... 75
Endpoint Details & Actions ....................................................................................................................... 76
Endpoint Detail ..................................................................................................................................... 76
Shield Detail ......................................................................................................................................... 76
Manager Detail (Windows only) ............................................................................................................ 79
States .................................................................................................................................................... 79
Threat Protection Detail (Windows only) ............................................................................................. 81
Advanced Threat Prevention Detail ..................................................................................................... 81
FDE Device Control (Windows only) ..................................................................................................... 81
PBA Device Control (Windows only) ..................................................................................................... 82
Protected Status ....................................................................................................................................... 82
Endpoint Users ......................................................................................................................................... 83
Shield .................................................................................................................................................... 83
Endpoint Threat Events ............................................................................................................................ 83
Endpoint Advanced Threats ..................................................................................................................... 84
List of Events ........................................................................................................................................ 84
Configure the Threat List ..................................................................................................................... 85
Export ................................................................................................................................................ 85
Quarantine ........................................................................................................................................ 85
Waive................................................................................................................................................. 85
Exploit Attempts ................................................................................................................................... 85
Endpoint Advanced Threat Events ........................................................................................................... 86
Server Encryption Clients ......................................................................................................................... 87
Suspend an Encrypted Server ............................................................................................................... 87
Reinstate an Encrypted Server ............................................................................................................. 87
Commands for Self-Encrypting Drives ...................................................................................................... 87
Priority of Commands for Self-Encrypting Drives ................................................................................. 87
Allow PBA Login Bypass ........................................................................................................................ 88
Unlock a Self-Encrypting Drive ............................................................................................................. 88
Remove Users from Endpoint with Self-Encrypting Drive .................................................................... 89
Lock a Self-Encrypting Drive................................................................................................................. 89
Send Wipe Command to Self-Encrypting Drive ..................................................................................... 89
Set the Dell Server Connection Retry Interval ..................................................................................... 90
v