Reference Guide
Navigate the Dell Server
68
Users - To view a list of users who store and access data on the endpoint, click Users. These
statistics of endpoint users may be available on the Endpoint Detail page: Login, Last Gatekeeper
Sync, Effective Policies, and States. You can also recover data from this page.
Endpoint Groups - To view a list of Endpoint Groups to which this endpoint belong, click Endpoint
Groups. All endpoint belong to at least one endpoint group, the Default Endpoint Group.
Threat Events - To view information about threat events on the endpoint, click Threat Events. The
following information is displayed for events: Severity, Category (Malware, Web Filtering, Web
Protection, and Firewall), Event ID, Event Description, User Name, and Received time stamp.
Advanced Events - To view, export, quarantine, or waive unsafe files, click Advanced Events.
Events are grouped by Status (Unsafe, Quarantined, or Abnormal), and the following information is
displayed for events: File Name, File Paths, Score, Classification, First Found time stamp, Running,
Auto Run, and Detected By.
6. If modified, click Save.
View Effective Policy
When you view Effective Policies, you are viewing the policies and settings that are enforced on an
endpoint.
1. In the left pane, click Populations > Endpoints.
2. Select the appropriate endpoint type, for example, Workstation or Mobile Device.
3. Click a Hostname or Endpoint Serial Number in the list or enter a filter to search for available
endpoints.
Note: The wildcard character (*) may be used but is not required at the beginning or end of the text.
For Windows and Mac, if you know the Hostname of the endpoint, enter it in the Search field.
However, you may leave the field blank to display all Windows and Mac endpoints.
For Mobile devices, optionally enter the model name or user's email address.
When you click a Hostname or Endpoint Serial Number, the Endpoint Detail page displays.
5. On the Endpoint Detail page, click the Details & Actions tab.
6. Under Manager Detail, click View Effective Policies.
Related topics:
Manage Security Policies
Endpoint Details & Actions
The Details & Actions page lists the details for the selected endpoint as well as commands, such as Remove
Endpoint. Available details and commands vary, depending on the endpoint platform.
To access Endpoint Details & Actions, follow these steps:
1. In the left pane, click Populations > Endpoints.
2. Search or select a Hostname, then the Details & Actions tab.
Endpoint Detail