Show 

Home > Computer monitoring > Actions on unprotected computers > Searching for unprotected computers

Configuring searches for unprotected computers

In order to improve monitoring of the protection installed on the network, Panda Cloud Office Protection lets administrators search for unprotected computers.

Administrators can even do this remotely, seeing at any time which computers are protected or unprotected from a location outside the network.

 

Creating a task to search for unprotected computers

In the main console window, click Installation. Then, select Search in the menu on the left. This will take you to the Find unprotected computers window.

To create a new search task, click New search. Then, in the Edit search window, use the Select button to choose the computer that will perform the search.

The scope of the search will be defined depending on whether you choose the subnet of the computer performing the search, certain IP address ranges or certain domains.

Requirements for the computer performing the search

The computer performing the search must meet a series of requirements.

(More information)

To find out more about how the results of the searches are displayed, refer to the Viewing searches and Search results section.

 

Viewing searches

Searches created are listed in the Find unprotected computers window, from where you can also remove search tasks, using the Delete button.

Information is organized into the following columns:

Name: This shows the name given to the search when created.

Status: The status icons indicate the status of the search task. Click Key to display them.

Discovered: This details the number of unprotected computers discovered.

Date created: Date the search task was created.

Created by: User that created the task.

Depending on your permissions, you can create, view, or delete search tasks. For more information, refer to the Types of permissions section.

 

Search results

Click the name of one of the search tasks displayed in the Find unprotected computers window to go to the Search results window. This will display all the unprotected computers that have been discovered after running the relevant search.

In addition to the name of the search, its start and end dates and its status, this window also offers information about any errors that might have occurred during the search.

To view the search settings, use the View settings link.