The list of protected computers lets you know the status of the protection installed on your network computers.
The protection for Linux computers allows for on-demand and scheduled scans only.
The protection for OS X computers allows for permanent file protection only. Click here for more information.
Select, from the group tree, the group or subgroup that you want to explore.
Select All to see all computers, regardless of the group/subgroup the computer is in.
The number of computers that you see will depend on the permissions that you have. Refer to the Types of permissions section.
You can choose for all protected computers to be displayed, using the Show all button, or use the Options drop-down menu and enable a filter that lets you search for computers depending on the status of the protection installed on them: enabled, disabled, with errors, pending restart, etc.
In the case of OS X computers, the solution will only indicate if the file protection is enabled, disabled or has errors. All other protection modules will appear as 'Not applicable'.
In the case of Linux computers, the Protection column will show an icon indicating that the protection is OK.
This search tool is also useful for finding out which computers do not have an up-to-date version of the signature file or getting a list of those computers which, for whatever reason, have not connected to the server in the last 48 hours.
Select a status from the Computer status drop-down menu and click Find.
The search results are presented in five columns:
The Computer column shows the list of protected computers, presented either by their name or by their IP address. If different computers have the same name and IP address, they will be displayed as different computers in the Web console provided that their MAC address and administration agent identifier are different.
If you want to change the way they are presented, you can do this from Preferences > Default view.
The Protection update, Signature update, and Protection columns use a series of icons to indicate the update status of the protection and its general situation. Place the mouse pointer over the icon to see this information.
In Last connection you can see the exact date and time at which the computer last connected to the update server.
Remote access. If an icon is displayed in this column, it means that the computer has at least one remote access tool installed. If the computer has only one tool installed, click the icon to access it. Enter the relevant credentials and access the computer. Bear in mind that the remote access feature is only available for Windows computers.
If the computer has multiple tools installed, place the mouse pointer over the icon to display all of them. Select one to access the computer remotely.
If you place the mouse pointer over a computer's name, a yellow tag will be displayed with the following information:
Computer IP address.
Full path of the group the computer belongs to.
Operating system installed on the computer.
Protection installation date.
Comment associated with the computer.
Other information.