Adding and searching for protected computers

 

The list of protected computers displayed in the Computers tab lets you know the status of the protection installed on all the computers on your network.

Bear the following in mind:

Select, from the group tree, the group or subgroup that you want to explore.

Select All to see all computers, regardless of the group/subgroup they are in.

 

Adding computers

To add a computer, click Add. Refer to the Installation methods according to the operating system section for information about how to install the protection on computers depending on their operating system.

 

Computer search

You can display all protected computers by using the Show all button, or click the Advanced option to search for computers depending on the status of their protection or their operating system:

In the case of OS X computers, the information in the Protection column will only refer to the file protection: enabled, disabled or with errors.

In the case of Linux computers, the Protection column will show an icon indicating that the protection is OK.

The search tool is also very useful for finding out which computers do not have an up-to-date version of the signature file, or getting a list of those computers which, for whatever reason, have not connected to the server in the last 72 hours.

Select a status from the Computer status drop-down menu and click Find.

The search results are presented in five columns:

If you want to change the way they are presented, go to the Preferences section at the top of the Web console.

Bear in mind that the remote access feature is only available for Windows computers.

If the computer has multiple tools installed, place the mouse pointer over the icon to display all of them. Select one to access the computer remotely.

If you place the mouse pointer over a computer's name, a yellow tag will be displayed with the following information:

  1. IP address.

  2. Full path of the group the computer belongs to.

  3. Operating system installed on the computer.

  4. Protection installation date.

  5. Comment associated with the computer.

  6. Other information.