Managing Computers
Select the checkbox to the left of the applicable computers and right-click to perform these actions:
General Actions
You can view logs of computers based on it's IP address.
To view computer logs by it's IP address:
-
Go to Asset Management > Computers.
-
Select the applicable computer or user from the list.
-
From the top toolbar, click .
-
Select General Actions > View Computer Logs.
The system opens the Logs menu and shows the computer logs.
You can create a virtual group. See Managing-Virtual-Groups.htm.
You can add computers to a new virtual group. See Managing-Virtual-Groups.htm.
You can add a computer to a virtual group (see Managing Virtual Groups).
When the Endpoint client is installed on a computer, information about the computer is sent to and stored on the Endpoint Security Management Server A Security Management Server that manages your Endpoint Security environment. Includes the Endpoint Security policy management and databases. It communicates with endpoint clients to update their components, policies, and protection data..
Resetting a computer means deleting all information about it from the server.
Resetting a computer does not remove the object from the Active Directory tree or change its position in the tree.
|
Important - You can only reset a computer if the Endpoint client is not installed. If you reset a computer that has Endpoint installed, important data is deleted and the computer can have problems communicating with the Endpoint Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server.. |
Computer reset:
-
Removes all licenses from the computer.
-
Deletes the settings of users that can log on to it.
-
Removes the computer from Endpoint Security Monitoring.
-
Deletes the Pre-boot Authentication before the Operating System loads. settings.
-
Marks the computer as unregistered.
After you reset a computer, you must reformat it before it can connect again to the Endpoint Security service.
You may decide to reset a computer if:
-
The Endpoint client was uninstalled or the computer is re-imaged.
-
It is necessary to reset the computer's configuration before a new Endpoint client is installed. For example, if the computer is transferred to a different person.
Removes the asset from the Local or Active Directory and adds it to Deleted Entities in the Organizational Tree. This operation discards the assets license information. You can use this operation when you remove an asset from your domain.
Note - If the Endpoint Security client is still installed on the asset, the client continues to receive the updates from the Endpoint Security Management Server Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..
To add the asset back to the Active Directory, see Recover.
Adds the deleted asset back to the Local or Active Directory from Deleted Entities in the Organizational Tree. The asset's status is not Active until its Endpoint Security client connects and synchronizes with the Endpoint Security Management Server. You can use this operation when you add an asset back to the domain.
Note - You can recover only a deleted asset.
Warning - Removes the asset from the Harmony Endpoint management permanently. You cannot recover a terminated asset. We recommend to terminate an asset only if it is discarded or disposed or the Endpoint Security client is uninstalled.
Harmony Endpoint can scan and import users, groups, Organizational units (OUs) and computers from multiple supported directory domains. See Managing Active Directory Scanners.