Using the Users and Computers Tree
The directory tree shows the Users and Computers hierarchy as a set folders and objects. You use the Users and Computers tree to see and select Users and Computers objects.
The tree includes these directories by default:
- - Users and computers included in Active Directory OUs.
- - Users and computers not included in an Active Directory.
- - Predefined ranges of IP address.
- - Users and computers that were deleted from the Active Directory.
- - Predefined Endpoint Security groups of users and computers. Members of a Virtual Group can also be part of the Active Directory or a member of other Virtual Groups.
When you right-click an object in the tree, you can do some of these options that show in the option menu, depending on the object type:
- - Open the window to see detailed rule and status information. You cannot edit rules or Object Details on this page. You can also use the button (in the upper right-hand corner of the pane) to open this window.
- - Remove licenses, Full Disk Encryption recovery data, Pre-boot settings, users and logs from the selected computer.
- or - Add the object and its members to a virtual group.
- or - Add or remove the selected object to the list, located under the Users and Computers tree.
- - See this object in logs.
- Opens a list of operations related to Full Disk Encryption.
- - Manually add users authorized who can login using the Full Disk Encryption Pre-boot screen.
- s - Manually add computers on which authorized users can login using the Full Disk Encryption Pre-boot screen.
- - Temporarily disable Pre-boot login for the selected user or members of the selected OU or group.
- - Manually add users authorized to use recovery media to recover an encrypted disk.
- - Opens a list of Push Operations related to Anti-Malware. Push Operations are operations that the Endpoint Security Management Server pushes directly to client computers with no policy installation required.
- - Run an Anti-Malware scan on the computer or computers, based on the configured settings.
- - Update malware signatures on the computer or computers, based on the configured settings.
- - Temporarily restores files from quarantine on the computer or computers, based on the configured settings.
- - Opens a list of Push Operations related to Client Settings. Push Operations are operations that the Endpoint Security Management Server pushes directly to client computers with no policy installation required.
- - Shut down the computer or computers based in the configured settings.
- - Shut down the computer or computers based in the configured settings.
- - Collect logs from the computer or computers based in the configured settings. Logs are stores in a shared folder on the client computer.
- - Repair the Endpoint Security client installation. This requires a computer restart.
- - Define a new address range.
How to use the Users and Computers Tree:
- Use the intelligent (above the tree) to search for objects. You can use partial words or phrases to see all objects that contain the search text.
- Double-click a parent directory to see its children.
- Click the triangle to go back up to a parent directory.
- Click the Users and Computers toolbar icon to go to the top of the tree.
- Select a user, computer or folder to see its Software Blade status and configuration.
- Double-click a user or computer or user to open its window.