Finding offline computers
You can list the computers that are offline.
A client may be offline for a number of reasons. You can identify the computers
that are offline and remediate these problems in a number of ways.
See
“Troubleshooting communication problems between the management server
and the client”
on page 316.
To find offline computers
1
In the console, click Home.
2
On the Home page, in the Endpoint Status pane, click the link that represents
the number of offline computers.
3
To get more information about offline computers, click the View Details link.
To run a report about offline client computers
1
In the console, click Monitors.
2
On the Logs tab, from the Log type list box, click Computer Status.
3
Click Advanced Settings.
4
In the Online status list box, click Offline.
5
Click View Log.
By default, a list of the computers that have been offline for the past 24 hours
appears. The list includes each computer's name, IP address, and the last time
that it checked in with its server. You can adjust the time range to display
offline computers for any time range you want to see.
Finding unscanned computers
You can list the computers that need scanning.
See
“Monitoring endpoint protection”
on page 261.
To find unscanned computers
1
In the console, click Reports.
2
On the Quick Reports tab, specify the following information:
You select Scan.
Report type
You select Computers Not Scanned.
Selected report
3
Click Create Report.
265
Monitoring protection with reports and logs
Monitoring endpoint protection
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...