Introduction

The Web console lets you monitor the status of your computers. In the case of the computers to which you have distributed the protection, you can monitor the protection status at all times. To do this, uses two lists of computers:

List of protected computers

List of unprotected computers

Each list offers an overview of the protection status of the computers, and also details of whether the protection has been installed correctly, if an error occurred during installation, if it is pending restart, and if the protection is up-to-date.

The group tree on the right-hand side of the window lets you move through the different group levels and see the computers included in each group.

To access the lists of protected and unprotected computers, use the Computers tab. You will see the Computers window, which has two tabs: Protected and Unprotected.

Click the relevant tab. You can search for computers, and export the list to Excel or CSV format. On any of the two tabs, clicking a computer name will take you to the computer details window.

The Computers window lets you take the following actions:

 

Move computers from one group to another

You can select one or more computers and move them from one group/subgroup to another. If the group has restrictions assigned to it and the maximum number of allowed installations has been reached, when you try to move a computer to that group/subgroup an error message will be displayed.

Users with monitoring permissions cannot move computers from one group to another.

 

Delete computers

You can select one or more computers and delete them simultaneously. This is very useful if, for example, you need to simultaneously delete various computers that have not connected to the server since a specific date.

Users with monitoring permissions cannot delete computers.

Remote computer access

Both the Protected computers and Unprotected computers tabs show the computers with remote control tools installed, so that you, depending on the permissions that you have, can access them from your administration console.

If the computer has multiple remote access tools installed and you place the mouse pointer over the icon in the Remote access column, you will see all the remote access tools installed on the computer. Click one of the icons to access the computer.

If the computer has different VNC tools installed (RealVNC, UltraVNC, TightVNC), you will only be able to access it remotely through one of them, in the following order of priority:

For more information about how to install the remote access tools on your computers, click the link in the blue information panel. Refer to the Remote access to computers section for more information.