You can assign Policy rules to groups.
Groups can contain users and computers.
For each Endpoint Security component, only one rule can be assigned to a user or computer. Therefore, if a user belongs to more than one group, with a different rules assigned to each group, the Endpoint Security Management Server applies the first rule that matches the user or computer.
You can use these types of groups in SmartEndpoint:
Virtual Groups work like Active Directory groups. You can:
You may want to use Virtual Groups if you are:
Important - To manage users with a virtual group, you must do one of these steps:
|
Users and computers with Endpoint Agent installed are automatically assigned to these predefined virtual groups:
The users and computers can be added to another virtual group, or removed from a virtual group and added to another virtual group.
If you add objects to a virtual group with an installation package, the objects are not automatically put into these virtual groups. You must do so manually.
Work with virtual groups in the Virtual Group branch of the Users and Computers tree.
When you create a new virtual group, you set the group type, which you cannot change. Changes to a virtual group are saved automatically and installed immediately on the Endpoint Security clients.
Assign the Virtual Groups in a Policy rule, as for any other entity.
To create a new virtual group:
To add computers and users from Active Directory to a Virtual Group:
All users and computers in the specified OU are added to the Virtual Group.
If select one of the default Virtual Groups, only those users and computers applicable to that group are added. For example, if you select the All Laptops Virtual Group, only laptops computers and their users are added to the group.
To copy a user or computer to another virtual group:
The source object becomes a member of the destination group while remaining a member of the source group.
To remove a user or computer from a virtual group:
You can assign a rule to a Virtual Group, as you can for any other entity.
This example shows how to use a Computer Group in the Media Encryption & Port Protection Policy, which is user-based.
Best Practice - In a component policy that is user-based, put computer group rules above user rules in the "more rule(s)" section
Read the comments in the rules.
No |
Name |
Applies to |
Comment |
- |
Media Encryption & Port Protection |
|
|
|
Default Media Encryption & Port Protection settings for the entire organization |
Entire Organization |
This rule applies to all users that are not logged into computers in "Media Encryption computer Group"
|
- |
1 more rule |
|
|
1 |
Media Encryption & Port Protection Rule for "Media Encryption computer Group" |
Media Encryption computer Group \Virtual Groups |
Media Encryption & Port Protection policy rules normally apply to users, regardless of which endpoint computer they use. However, this rule applies to computers in "Media Encryption Computer Group" regardless of which users are logged in to the computer.
|
You can deploy Endpoint Security components to Endpoint Security clients according to Virtual Groups.
This example shows Software Deployment Rules that specify the components to be deployed to the All Laptops and All Desktops Virtual Groups.
Read the comments in the rules.
No |
Name |
Applies to |
Actions |
Comment |
- |
Software Deployment |
|
|
|
|
Default Deployment |
Entire Organization |
Do Not install |
Default Software Deployment settings for the entire organization
|
- |
2 more rules |
|
|
|
1 |
Deployment to Desktops |
All Desktops \Virtual Groups |
Endpoint Client Version 80.88.4122 Selected blades |
|
2 |
Deployment to laptops |
All Laptops \Virtual Groups |
Endpoint Client Version 80.88.4122 Selected blades |
Same as desktop plus Full Disk Encryption and Endpoint Security VPN |
Virtual Groups show in Reporting reports like other objects. You can create for monitoring and other purposes. Endpoints can be members of more than one group.
For example, if you want to do a test of a new Endpoint Security upgrade, you can create a Virtual Group that contains only those endpoints included in the test. Then you can create a report for the deployment and activity of these endpoints.
To see activity for virtual group objects: