Configuring searches for unprotected computers

 

In order to improve monitoring of the protection installed on computers, lets administrators search for unprotected computers.

Administrators can even do this remotely, seeing at any time which computers are protected or unprotected, from a location outside the network.

 

Creating a task to search for unprotected computers

In the main console window, click Installation. Then, select Search in the menu on the left. This will take you to the Find unprotected computers window.

To create a new search task, click New search.

In the Edit search window, use the Select button to choose the computer that will perform the search.

The scope of the search will be defined depending on whether you choose the subnet of the computer performing the search, certain IP address ranges or certain domains.

Requirements for the computer performing the search

The computer performing the search must meet a series of requirements.

(More information)

 

Viewing searches

Searches created are listed in the Find unprotected computers window, from where you can also remove search tasks, using the Delete button.

Information is organized into the following columns:

Depending on your permissions, you will be able to create, view, or delete search tasks. For more information, refer to the Types of permissions section.

 

Search results

Click the name of one of the search tasks displayed in the Find unprotected computers window to go to the Search results window. This will display all the unprotected computers that have been discovered after running the relevant search.

In addition to the name of the search, its start and end dates and its status, the window will report any errors that might have occurred in the search process.

To view the settings of a search task, use the View settings link.