You manage individual computers in the Users and Computers window. This window shows computer details and the policies and user assigned to them. You can configure which users can log on the computer.
To see computer details:
The Computer Details window opens. You can see detailed information as well as rules and status information for each of the components. You cannot change rules and Action settings in this window.
To change rules:
See the applicable component topics for configuration details.
If the Full Disk Encryption component is included in policy for a specified computer, only users authorized for that computer can log on to it.
Manage the users who can logon to a computer in Computer Details > Security Blades > OneCheck User Settings for a specified computer.
To add authorized users to a computer:
Add more users as necessary.
To remove authorized users from the computer:
When the Endpoint Security client is installed on a computer, information about the computer is sent to and stored on the Endpoint Security Management Server. Resetting a computer means deleting all information about it from the server. Resetting a computer does not remove the object from the Users and Computers tree or change its position in the tree.
Important - You can only reset a computer if the Endpoint Security client is not installed. If you reset a computer that has Endpoint Security installed, important data will be deleted and the computer can have problems communicating with the Endpoint Security Management Server. |
You might choose to reset a computer if:
Computer reset:
After you reset a computer, you must reformat it before it can connect again to the Endpoint Security service.
Note - Resetting a Computer is different than deleting it. If you delete a computer, everything in the databases that is connected to that computer is deleted. |
To reset a computer: