Viewing Computer Information
The Asset ManagementView
The view shows information on each computer, such as deployment status, active components on the computer, version installed on the computer and more.
|
Note - The General > Description at bottom pane shows the text entered in the Active Directory for the asset. If no text is entered, it is blank. |
From the top menu Columns, select a preconfigured view:
-
Deployment
-
Compliance
-
Health
-
Full Disk Encryption
-
Anti-Malware
-
Host Isolation
-
Alternatively, click Custom and select the required columns.
Status Icon
The icon in the Status column shows the client or computer status.
Status Icon |
Description |
---|---|
|
Indicates . |
|
Indicates Harmony Browse client. |
|
Indicates that the client connection is active. |
|
Indicates that a new computer was discovered that has no client installed. |
|
Indicates that the computer was deleted from the Active Directory or from the Organizational Tree. |
Filters
Use the Filters pane on the right side of the screen to filter the information in the table.
These are the main filters for this view:
-
Filter by computer property
-
Filter by Virtual Group
-
Filter by Organization Unit (this information is pulled from your Active Directory)
Working with the Computers Table
-
Hover over the column and click .
-
From the drop-down :
-
To adjust the column position in the table, drag and drop the column to the required position.
-
To copy the value of a cell to the clipboard, hover over a cell and click Copy.
-
To copy the values of a row to the clipboard, hover over a row and click Copy row.
Managing Computers
Select the checkbox to the left of the applicable computers and right-click to perform these actions:
General Actions
You can view logs of computers based on it's IP address.
To view computer logs by it's IP address:
-
Go to Asset Management > Computers.
-
Select the applicable computer or user from the list.
-
From the top toolbar, click .
-
Select General Actions > View Computer Logs.
The system opens the Logs menu and shows the computer logs.
You can create a virtual group. See Managing-Virtual-Groups.htm.
You can add computers to a new virtual group. See Managing-Virtual-Groups.htm.
You can add a computer to a virtual group (see Managing Virtual Groups).
When the Endpoint client is installed on a computer, information about the computer is sent to and stored on the Endpoint Security Management Server A Security Management Server that manages your Endpoint Security environment. Includes the Endpoint Security policy management and databases. It communicates with endpoint clients to update their components, policies, and protection data..
Resetting a computer means deleting all information about it from the server.
Resetting a computer does not remove the object from the Active Directory tree or change its position in the tree.
|
Important - You can only reset a computer if the Endpoint client is not installed. If you reset a computer that has Endpoint installed, important data is deleted and the computer can have problems communicating with the Endpoint Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server.. |
Computer reset:
-
Removes all licenses from the computer.
-
Deletes the settings of users that can log on to it.
-
Removes the computer from Endpoint Security Monitoring.
-
Deletes the Pre-boot Authentication before the Operating System loads. settings.
-
Marks the computer as unregistered.
After you reset a computer, you must reformat it before it can connect again to the Endpoint Security service.
You may decide to reset a computer if:
-
The Endpoint client was uninstalled or the computer is re-imaged.
-
It is necessary to reset the computer's configuration before a new Endpoint client is installed. For example, if the computer is transferred to a different person.
Removes the asset from the Local or Active Directory and adds it to Deleted Entities in the Organizational Tree. This operation discards the assets license information. You can use this operation when you remove an asset from your domain.
Note - If the Endpoint Security client is still installed on the asset, the client continues to receive the updates from the Endpoint Security Management Server Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..
To add the asset back to the Active Directory, see Recover.
Adds the deleted asset back to the Local or Active Directory from Deleted Entities in the Organizational Tree. The asset's status is not Active until its Endpoint Security client connects and synchronizes with the Endpoint Security Management Server. You can use this operation when you add an asset back to the domain.
Note - You can recover only a deleted asset.
Warning - Removes the asset from the Harmony Endpoint management permanently. You cannot recover a terminated asset. We recommend to terminate an asset only if it is discarded or disposed or the Endpoint Security client is uninstalled.
Harmony Endpoint can scan and import users, groups, Organizational units (OUs) and computers from multiple supported directory domains. See Managing Active Directory Scanners.
The Overview View
The Overview page shows a graphical summary of important information about the clients in your organization.
Operational Overview
The information in the Operational Overview appears in widgets described below. Each widget is clickable, and takes you to the relevant view based on the
The information is presented in these widgets:
Widget |
Description |
---|---|
All Endpoints |
Shows the number of protected endpoints and the number of endpoints which report issues. This widget is based on the Health view. |
Desktops |
Shows a division of the desktops by operating systems: Windows, macOS, and Linux. This widget is based on the Health view. This widget only includes protected entities. |
Laptops |
Shows a division of the laptops by operating systems: Windows, macOS, and Linux. This widget is based on the Health view. This widget only includes protected entities. |
Deployment Status |
Shows the deployment status of the devices according to these values:
|
Health Status |
Shows which computers have installed components that are not running. |
Anti-Malware Update |
Shows the time when updates were installed on the endpoint clients:
This widget is based on the Anti-Malware update ON data in the Deployment Status. |
Harmony Endpoint Version |
Shows the client versions installed on the endpoint clients. This widget is based on the Deployment view. |
Operating System |
Shows the type of operating system installed on the endpoint clients:
|
In addition, in the top right section Active Alerts you can see alerts for the thresholds you created in the Endpoint Settings view > Alerts (see Monitoring Harmony Endpoint Deployment and Policy).
Custom Dashboard
The Custom Dashboard allows you to create personalized dashboards with widgets of your preference and specify whether the dashboard should be private or public. Private dashboards are available only for you to view whereas, Public dashboards are available for all the users with access to the Overview page. However, only the owner of the dashboard can edit it.
Blank dashboard allows you to create a new dashboard with available widgets. allows you to customize the .
Creating a Custom Dashboard
-
Go to Overview and click next to Custom Dashboard.
-
To create a new custom dashboard from scratch:
-
Hover over the Blank dashboard widget and click Add.
-
In the Dashboard name field, enter a name.
-
Click Add Your First Widget.
The Add Widget window appears.
-
-
To create a custom :
-
Hover over the widget and click Duplicate.
-
In the Dashboard name field, enter a name.
-
Click Add Widget.
The Add Widget window appears.
-
-
From the left pane, select the widget and click Add.
Note - The Add button is disabled if the widget is already added to the dashboard.
-
To add more widgets, click Add Widget and repeat step 4.
-
To delete a widget, on the widget, click and click Delete.
-
By default, all custom dashboards you create are set as Private. To make the custom dashboard available to all users with access to the Overview page, from the Private list on the upper-right corner, click Public. The system adds the dashboard under Public dashboards for other users.
-
Click Save.
The dashboard appears under Custom Dashboard on the left navigation pane, and it is also listed under My dashboards in the Custom Dashboard page.
Managing a Custom Dashboard
-
Click Overview.
-
To edit a dashboard:
-
Expand Custom Dashboard.
-
Click for the dashboard you want to edit and click Edit.
-
Make the necessary changes and click Save.
Note - You cannot edit dashboards created by other users.
-
-
To delete a dashboard, expand Custom Dashboard, click for the dashboard you want to delete and click Delete.
Note - You cannot delete dashboards created by other users.
-
To hide a dashboard, expand Custom Dashboard, click for the dashboard you want to hide and click Hide. The dashboard is removed from the list under Custom Dashboard on the left navigation pane.
-
To unhide a dashboard, click , hover over the dashboard you want to unhide and click Add. The dashboard is added to the list under Custom Dashboard on the left navigation pane.
-
To duplicate a dashboard, click , hover over the dashboard and click Duplicate.
Reports
On the Reports page, you can download the reports in the pdf format:
-
Threat Extraction Report - Shows the insights on the downloaded files.
-
Check Point Cyber Security Report - Shows the latest security trends as per Check Point.
Generate Report
To generate a report:
-
Go to Overview > Reports > Generate Report.
-
Select a report, click and select Export Report.
The Export Report window appears.
-
In the Time Frame list, select Last day, Last 7 days, or Last 30 days.
-
Click Export.
Scheduled Reports
Scheduled Reports allows you to automatically generate reports at the specified date and time, and email it to the specified recipients.
|
Notes:
|
To schedule a report:
-
Navigate to Overview> Reports and do one of these:
-
From the Scheduled Reports page, click Add and from the Name list, select the report.
-
From the Generate Report page, select the report, click and select Schedule Report.
-
-
From the Name list, select the report.
-
From the Time Frame list, select the period for the report:
-
Last day
-
Last 7 days
-
Last 30 days
-
-
From the Frequency list, select the frequency to generate the report:
-
To generate the report everyday, select the day of the week.
-
To generate the report weekly, select the day of the week.
-
To generate the report every month, select the date.
-
-
In the Time field, specify the time for the system to generate the report and send it to the recipients. By default, the time is in UTC. For example, if you want to generate the report at 01.00 AM Eastern Standard Time (EST), you must specify the time as 06.00 AM UTC.
-
In the Recipients field, enter the recipients for the report.
-
Click Schedule.
The schedule is added to the table. The report becomes effective 24 hours after you schedule it.
-
To edit a scheduled report, select the report in the table and click Edit.
-
To delete a scheduled report, select the report in the table and click Delete.
Announcements
The Announcements page shows the latest news and enhancements in .