Reference Guide

Security Management Server v10.2.10 AdminHelp
77
1. In the left pane, click Populations > Endpoints.
2. Select the appropriate endpoint type, for example, Workstation.
3. Click a hostname in the list or enter a filter to search for available endpoints. The wildcard
character (*) is supported.
For Windows and Mac, if you know the endpoint hostname, enter it in Search. Leave the field
blank to display all Windows and Mac endpoints.
Click a hostname or endpoint serial number to display the Endpoint Detail page.
4. Click the tab that corresponds with the action to perform:
Security Policies - Click Security Policies to view or modify policies of the endpoint.
Details & Actions - Click Details & Actions to view properties of the endpoint, including
Inventory Information. Viewable information includes hardware information, effective policies,
inventory and protection status, threat protection and Advanced Threat Prevention detail, and
SED Device Control commands.
Users - Click Users to view a list of users who store and access data on the endpoint. These
statistics of users may be available on the Endpoint Detail page: login, last Gatekeeper sync,
effective policies, and states. You can also recover data from this page.
Endpoint Groups - Click Endpoint Groups to view a list of Endpoint Groups to which this
endpoint belongs. All endpoint belong to at least one endpoint group, the Default Endpoint
Group.
Threat Events - Click Threat Events view information about threat events on the endpoint. The
following information is displayed for events: severity, category (malware, web filtering, web
protection, and firewall), event ID, event description, user name, and received.
Advanced Threat Events - Click Advanced Threat Events view, export, quarantine, or waive
unsafe files. Events are grouped by Status (unsafe, quarantined, or abnormal), and the following
information is displayed for events: file name, file paths, score, classification, first found time
stamp, running, auto run, and detected by.
5. If modified, click Save.
View Effective Policy
When you view Effective Policies, you are viewing the policies and settings that are enforced on an
endpoint.
1. In the left pane, click Populations > Endpoints.
2. Click a hostname in the list or enter a filter to search for available endpoints. The wildcard
character (*) is supported.
For Windows and Mac, if you know the endpoint hostname, enter it in Search. Leave the field
blank to display all Windows and Mac endpoints.
Click a hostname or endpoint serial number to display the Endpoint Detail page.
3. On the Endpoint Detail page, click the Details & Actions tab.
4. Under Manager Detail, click View Effective Policies.
Related topics:
Manage Security Policies