Configuring searches for unprotected computers

 

To facilitate and improve the monitoring of the protection installed on your computers, Endpoint Protection allows you to configure tasks to search for unprotected computers.

You can even monitor your network remotely, seeing at any time which computers are protected or unprotected, from a location outside the network.

 

Creating a task to search for unprotected computers

In the Web console main window, click Installation. Then, select Search in the menu on the left. This will take you to the Find unprotected computers window.

To create a new search task, click New search.

In the Edit search window, use the Select button to choose the computer that will perform the search.

The scope of the search will depend on whether you want to search for computers in the subnet of the computer performing the search, within certain IP address ranges or within certain domains.

Requirements for the computer performing the search

The computer performing the search must meet a series of requirements.

(More information)

 

Viewing searches

The searches you create are listed in the Find unprotected computers window, from where you can remove them, using the Delete button.

The information in this window is organized into the following columns:

Depending on the permission that you have, you will be able to create, view, or delete search tasks. For more information, refer to the Types of permissions section.

 

Search results

Click the name of any of the search tasks displayed in the Find unprotected computers window to go to the Search results window. This will display all the unprotected computers that have been discovered after running the relevant search.

In addition to the name of the search, its start and end dates and its status, the window will report any errors that might have occurred during the search process.

To view the settings of a search task, click the View settings link.