Endpoint Management
Last updated
Last updated
The Endpoint Management page allows users to manage all the client machines, devices, and servers on the same page.
Device Management: This section displays every endpoint that has an agent. The users can take actions like enable/disable the endpoint, set it as trusted/malicious, set the importance level, view, add a filter, and exclude the entry from the table. The users can monitor the agent's and package manager's health state, IP and MAC addresses, and other specific data on the endpoints.
Device Summary: This section displays how many machines/servers are assigned to the portal, what is their operation system and version. The users can take bulk actions on this page like enabling/disabling agents.
Blocked Devices: This section displays blocked client devices.
Permitted Devices: This section displays permitted client devices.
Asset Analysis: This section displays assets discovered on the machines that are separated by risk scores. The users can drill down the entry to analyze the assets.
Windows Asset Analysis: This section displays Windows assets discovered on the Windows machines that are separated by risk scores. The users can drill down the entry to analyze the assets.
Shadow IT Overview: This section displays shadow IT analysis results separated by risk scores.
EASM Analysis: This section displays External Attack Surface Management Analysis results by risk scores.
Add-In Tracking: This section displays active add-in agents on the client/server machines.