Reference Guide

Security Management Server v10.2.10 AdminHelp
85
Click a hostname or endpoint serial number to display the Endpoint Detail page.
3. A green check mark displays in the Protected column if any of the criteria for Protected status
are met.
Endpoint Users
This page displays information for every user of the specified endpoint. The user information differs for
each technology group or policy category.
1. In the left pane, click Populations > Endpoints.
2. Search or select a hostname, then the Users tab.
Shield
User - Each user on the specific endpoint
Last Successful Login - Date/time stamp, per user
Last Unsuccessful Login - Date/time stamp, per user
Last Gatekeeper Sync - Date/time stamp, per user
Effective Policies - Click view for a simple layout view of the effective user policies
Actions - Click Recover to proceed to the Recover Data page
Last Encryption Sweep Start - Date/time stamp, per user
Sweep End - Date/time stamp, per user
Encryption Failure - Click view for a simple list of files that could not be encrypted, per user
States (Date/time stamp, per user):
Policy Updating
User Encryption Profile Updating
EMS Encryption Profile Updating
User Data Encryption On
EMS Data Encryption On
Deactivation Pending
Suspension Pending
Suspended
Endpoint Threat Events
This page lists information on threat events for the selected endpoint.
1. In the left pane, click Populations > Endpoints > Workstation.
2. Search or select a Hostname, then the Threat Events tab.
Threat Event Data