To facilitate and improve the monitoring of the protection installed on your computers, Endpoint Protection allows you to configure tasks to search for unprotected computers.
You can even monitor your network remotely, seeing at any time which computers are protected or unprotected, from a location outside the network.
It is not possible to search for unprotected computers from a Linux or OS X computer.
It is not possible to simultaneously search for unprotected computers and run remote uninstall tasks. For more information, refer to the Incompatibility between remote management tasks section.
In the Web console main window, click Installation. Then, select Search in the menu on the left. This will take you to the Find unprotected computers window.
To create a new search task, click New search.
In the Edit search window, use the Select button to choose the computer that will perform the search.
The scope of the search will depend on whether you want to search for computers in the subnet of the computer performing the search, within certain IP address ranges or within certain domains.
The computer performing the search must meet a series of requirements.
The searches you create are listed in the Find unprotected computers window, from where you can remove them, using the Delete button.
Tasks with the Starting or In progress status cannot be deleted.
The information in this window is organized into the following columns:
Name: Shows the name given to the search when created.
Status: Displays an icon indicating the status of the task. Click Key to see what each icon represents.
Discovered: Indicates the number of unprotected computers discovered.
Date created: Date the task was created.
Created by: User that created the task.
Depending on the permission that you have, you will be able to create, view, or delete search tasks. For more information, refer to the Types of permissions section.
Click the name of any of the search tasks displayed in the Find unprotected computers window to go to the Search results window. This will display all the unprotected computers that have been discovered after running the relevant search.
In addition to the name of the search, its start and end dates and its status, the window will report any errors that might have occurred during the search process.
If the status of the search task is On hold, the start date will display a hyphen (-). The same applies to the end date if the task has not finished.
To view the settings of a search task, click the View settings link.