Endpoint Management

The Endpoint Management page allows users to manage all the client machines, devices, and servers on the same page.

  • Device Management: This section displays every endpoint that has an agent. The users can take actions like enable/disable the endpoint, set it as trusted/malicious, set the importance level, view, add a filter, and exclude the entry from the table. The users can monitor the agent's and package manager's health state, IP and MAC addresses, and other specific data on the endpoints.

  • Device Summary: This section displays how many machines/servers are assigned to the portal, what is their operation system and version. The users can take bulk actions on this page like enabling/disabling agents.

  • Blocked Devices: This section displays blocked client devices.

  • Permitted Devices: This section displays permitted client devices.

  • Asset Analysis: This section displays assets discovered on the machines that are separated by risk scores. The users can drill down the entry to analyze the assets.

  • Windows Asset Analysis: This section displays Windows assets discovered on the Windows machines that are separated by risk scores. The users can drill down the entry to analyze the assets.

  • Shadow IT Overview: This section displays shadow IT analysis results separated by risk scores.

  • EASM Analysis: This section displays External Attack Surface Management Analysis results by risk scores.

  • Add-In Tracking: This section displays active add-in agents on the client/server machines.

Last updated

Was this helpful?