eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

(Difference between revisions)
Jump to: navigation, search
Revision as of 09:50, 26 November 2021
TechContent (Talk | contribs)

← Previous diff
Revision as of 09:51, 26 November 2021
TechContent (Talk | contribs)

Next diff →
Line 160: Line 160:
<li style='font-size:11.0pt;font-family:"Open Sans"'><b>Check for Web Protection</b>: Select this check box if you want to view the list of client systems on which protection of <b>Web Protection</b> module is inactive.</li> <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Check for Web Protection</b>: Select this check box if you want to view the list of client systems on which protection of <b>Web Protection</b> module is inactive.</li>
<li style='font-size:11.0pt;font-family:"Open Sans"'><b>Number of Records</b>: Enter the number of client system that you want to view in the list.</li> <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Number of Records</b>: Enter the number of client system that you want to view in the list.</li>
-<h3 style='color:#007FFF;font-size:18.0pt;font-family:"Open Sans"'><b>Steps to define computer settings</b> </h3>+<h4 style='color:#007FFF;font-size:18.0pt;font-family:"Open Sans"'><b>Steps to define computer settings</b> </h4>
<p style='font-size:11.0pt;font-family:"Open Sans"'>To save the computer settings, follow the steps given below:</p> <p style='font-size:11.0pt;font-family:"Open Sans"'>To save the computer settings, follow the steps given below:</p>
<ol> <ol>

Revision as of 09:51, 26 November 2021

Contents

Events and Computers

eScan Management Console maintains the record of all the events sent by the client computer. Through the events & computers module, the administrator can monitor the Events and Computers; the module lets you sort the computer with specific properties.

Events Status

The Event Status subfolder is divided into following sections:

  • Recent
  • Critical
  • Information
  • Recent

    The Recent section displays both Information and Critical events.

    Critical

    The Critical section displays Critical events and immediate attention.

    For example, Virus detection, Monitor disabled.

    The Critical events can be filtered on the basis of date range and the report can be exported in .xls or .html format.

    Information

    The Information section displays basic information events.

    For example, Virus database update, Status.

    Computer Selection

    The Computer Selection subfolder displays computers that fall under different categories. It lets you select the computer and take the preferred action. You can also set the criteria for each section and sort the computer accordingly.

    The Computer Selection subfolder consists following sections:

  • Computers with "Critical Status"
  • Secondary Server Status (Not Updated)
  • Computers with Live Status
  • Computer with "Warning Status"
  • Database is outdated
  • Many Viruses Detected
  • No eScan Installed
  • Not connected for a long time
  • Not scanned for a long time
  • Protection is off
  • Update Agent Status
  • Computers with critical status

    This section displays computers marked with Critical status.

    Secondary Server Status (Not Updated)

    A secondary server receives downloads from the primary server and further distributes to the client computers. If the secondary server is not updated, it will be mentioned in the log

    Computers with Live status

    This section displays whether the computers present in the network are online or offline.

    To get the details of the specific computers' status, select Computers with Live Status option. This will display the computers with default online status along with other details such as IP Address, Group, Description, and more. To display all the endpoints in the network, you can use filter options that filters out based on Status Type.

    After selecting the computer from the list, you can choose System Action List dropdown option from the top panel. This option allows you to perform specific set of actions on the selected endpoints.

    NOTE

    The required action can be performed only if the endpoint system is online. The green right symbol indicates that the endpoint is online and red wrong symbol indicates that the system is offline.

    The following actions can be performed on the online system according to the need of the user:

  • Log off: This option will log off the system from the current user.
  • Force Log off:This option will log off the current user forcefully.
  • Lock Machine:This option will lock the system automatically.
  • Shutdown Machine:This option will shut down the system.
  • Force Shutdown Machine:This option will shut down the system forcefully.
  • Restart Machine:This option will restart the system.
  • Force Restart Machine:This option will restart the system forcefully.
  • Hibernate Machine:This option will hibernate the system that will consume less power than sleep mode and resumes back to the previous states when you startup the system.
  • Stand By Machine:This option will put the machine in the standby mode. The standby mode is similar to as that of Hibernate mode.
  • Computers with warning status

    This section displays computer with a warning status.

    Database is outdated

    This section displays computers whose virus database is outdated.

    Many Viruses Detected

    This section displays the computers whose virus count has exceeded.

    No eScan installed

    This section displays computers on which eScan is not installed.

    Not connected for a long time

    This section displays the computers which didn’t connect to the eScan server for the set duration.

    Not scanned for a long time

    This section displays the computers which weren’t scanned for the set duration.

    Protection is off

    This section displays the computers on which File Protection is disabled.

    Update Agent Status

    This section displays the status of computers assigned as Update Agent.

    The additional settings vary depending upon the Computer Status.

    Edit Selection

    This drop-down menu allows to configure various option based on selected options. The following options are present in the menu:

  • Protection: This option displays the protection status of the selected computer.
  • Events: This option displays the events that were performed in the particular computer.
  • Deploy/Upgrade Client: To learn about this option, Check Client Action List in Managed Computer.
  • Check Connection: This option will verify if the client machine is online or offline.
  • Remove from Group: To learn about this option, Check Client Action List in Managed Computer.
  • Connect to Client (RMM): To learn about this option, Check Client Action List in Managed Computer.
  • Force Download: To learn about this option, Check Client Action List in Managed Computer.
  • On Demand Scanning: To learn about this option, Check Client Action List in Managed Computer.
  • Send Message: To learn about this option, Check Client Action List in Managed Computer.
  • Properties: To learn about this option, Check Client Action List in Managed Computer.
  • Software/Hardware Changes

    This subfolder displays all software/ hardware changes that occurred on computers. It consists following sections:

  • Software Changes
  • Hardware changes
  • Existing System Info
  • Software Changes

    This section displays software changes i.e. installation, uninstallation or software upgrades.

    Hardware changes

    This section displays hardware changes that occurred on computers. For example, IP address. Hard Disk, RAM etc.

    Existing System Info

    This section displays a computer's existing hardware/software information.

    Violations

    Date/Time Violations

    This subfolder consists Date/Time Violations that displays client computers whose users attempted to modify date and time.

    Settings

    You can define the Settings for Events, Computer Selection and Software/Hardware changes by clicking on the Settings option and defining the desired settings using the Tabs and options present on the Events and Computer settings window.

    This subfolder consists Date/Time Violations that displays client computers whose users attempted to modify date and time.

    Event Status Setting

    Basically, events are activities performed on client's computer.

    On the basis of severity, the events are categorized in to the following types:

  • Recent: It displays both critical and information events that occurred recently on managed client computers.
  • Information: It displays all informative types of events, such as virus database update, status, and so on.
  • Steps to define event status settings:

    Perform the following steps to save the event status settings:

    1. Select the appropriate Events Name.
    2. Enter the number of events that you want to view in a list, in the Number of Records field.
    3. Click Save. The settings get saved.

    Computer Selection

    The Computer Selection lets you select and save the computer status settings. This module lets you do the following activities:

    Critical Status: It displays a list of computers that are critical in status, as per the criteria's selected in computer settings. Specify the following field details.

  • Check for eScan Not Installed: Select this check box to view the list of client systems under managed computers on which eScan has not been installed.
  • Check for Monitor Status: Select this check box to view the client systems on which eScan monitor is not enabled.
  • Check for Not Scanned: Select this check box to view the list of client systems which has not been scanned.
  • Check for Database Not Updated: Select this check box to view the list of client systems on which database has not been updated.
  • Check for Not Connected: Select this check box to view the list of eScan client systems that have not been communicated with eScan server.
  • Database Not Updated from more than: Enter the number of days from when the database has not been updated.
  • System Not Scanned for more than: Enter the number of days from when the system has not been scanned.
  • System Not Connected for more than: Enter the number of days from when the client system has not been connected to eScan server.
  • Number Of Records: Enter the number of client systems that you want to view in the list.
  • Warning Status: It displays the list of systems which are warning in status, as per the criteria's selected in computer settings. Specify the following field details:

  • Check for Not Scanned: Select this check box to view the list of client systems which has not been scanned.
  • Check for Database Not Updated: Select this check box to view the list of client systems on which database has not been updated.
  • Check for Not Connected: Select this check box to view the list of eScan client systems that have not been communicated with eScan server.
  • Check for Protection off: Select this check box to view the list of client systems on which protection for any module is inactive.
  • Check for Many Viruses: Select this check box to view the list of client systems on which maximum viruses are detected.
  • Database Not Updated from more than: Enter the number of days from when the database has not been updated.
  • System Not Scanned for more than: Enter the number of days from when the system has not been scanned.
  • System Not Connected for more than: Enter the number of days from when the client system has not been connected to eScan server.
  • Number Of Virus: Enter the number of viruses detected on client system.
  • Number Of Records: Enter the number of client systems that you want to view in the list.
  • Database are Outdated: It displays a list of systems on which virus database is outdated. Specify the following field details:

  • Database Not Updated from more than: Enter the number of days from when the database has not been updated.
  • Number Of Records: Enter the number of client systems that you want to view in the list.
  • Many viruses Detected: It displays a list of systems on which number of viruses exceeds the specified count in computer settings. Specify the following field details:

  • Database Not Updated from more than: Enter the number of days from when the database has not been updated.
  • Number Of Virus: Enter the number of viruses detected on client system.
  • Number Of Records: Enter the number of client systems that you want to view in the list.
  • Protection is off: It displays the list of systems on which protection is inactive for any module, as per the protection criteria's selected in computer settings. It shows the status as "Disabled" in the list. Specify the following field details.

  • Check for Monitor Status: Select this check box if you want to view the client systems on which eScan monitor is not enabled.
  • Check for Mail Anti-Phishing: Select this check box if you want to view the list of client systems on which Mail Anti-Phishing protection is inactive.
  • Check for Mail Anti-Virus: Select this check box if you want to view the list of client systems on which Mail Anti-Virus protection is inactive.
  • Check for Mail Anti-Spam: Select this check box if you want to view the list of client systems on which Mail Anti- Spam protection is inactive.
  • Check for Endpoint Security: Select this check box if you want to view the list of client systems on which Endpoint Security protection is inactive.
  • Check for Firewall: Select this check box if you want to view the list of client systems on which Firewall protection is inactive.
  • Check for Proactive: Select this check box if you want to view the list of client systems on which Proactive protection is inactive.
  • Check for Web Protection: Select this check box if you want to view the list of client systems on which protection of Web Protection module is inactive.
  • Number of Records: Enter the number of client system that you want to view in the list.
  • Steps to define computer settings

    To save the computer settings, follow the steps given below:

    1. Click Computers Selection tab.
    2. Select a type of status for which you want to set criteria, from the Computer status drop-down.
    3. Select the appropriate check boxes, and then enter field details in the available fields. For more information, refer [Types and criteria of computer status] section.
    4. Click Save. The settings will be saved.


    eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

        Privacy policy  About eScan Wiki  Disclaimers