This window lets you configure a number of general settings regarding the Web console:
Choose the way in which computers are displayed: by name or by IP address. Select the option you want.
Select this option to limit the number of installations and the groups' expiration dates. Select the relevant checkbox.
Use this section to enter the credentials to access other computers using different remote access tools.
These credentials are unique for each user, that is, each user of the administration console will enter their own credentials to access other computers.
If you don't want to allow your service provider to access your computers, clear the option Let my service provider access my computers remotely.
If the console is accessed from the console, the credentials entered by the user that accesses it for the first time will be the same as those used by other users of the console that try to access it later.
Every user that accesses a client's console from the console will be able to change the access credentials, although this change will affect other users.
Use this option if you want to send suspicious files to our laboratory for analysis. In the event of malware infection, we will send you a response and distribute adequate protection as soon as possible.
If you are a user with total control permissions, you will be able to access the account management feature.
You can draw up a list of computers to which the protection will not be distributed. You can always add or remove computers to/from the list.
This list will also include:
Protected computers for which there are no licenses available; that is, computers from clients who are using more licenses than they have purchased. You can generate this list manually or have it generated automatically.
Computers belonging to expired groups or groups whose maximum number of installations allowed has been exceeded.
This list will display the Windows, Linux or OS X computers that have been blacklisted. It will also display the computers' operating system. This way, you'll know which licenses you need to purchase in order to take computers out of the blacklist.