ZeroLock® Management Console: Endpoint Details

Overview of the ZeroLock Management Console Endpoint Details homepage.

    From the Endpoints homepage, double-clicking anywhere on the row of an endpoint will open its Endpoint Details page.   

    Step_1_Endpoints Mainpage

     

    Step_2_Endpoint Details Page


    Actions Drop-down list

    The ACTIONS drop-down menu lists the actions that could be taken on an endpoint.  Greyed-out items are not available on this specific endpoint.

    Step_3_Details_Actions Menu-1

    Endpoint Details

    Step_4_Details Explained-1

    STATUS

    The status of the selected Endpoint.  

    Options:  Green - Connected, Red - Disconnected, Yellow - Deactivated, Pink - Quarantined.

    ALERTS

    The three (3) blocks to the right represent the counters for the severity types of alerts.

    Options: High - red, Medium - yellow, and Low - green.

    LAST CHECK-IN The time since the endpoint has checked in with the ZeroLock®  Management Console (ZMC). This is done every 30 seconds.
    HOSTNAME The name of the system on which the ZeroLock Agent resides.
    IP ADDRESS The IP address of the endpoint.
    MAC ADDRESS The MAC address of the endpoint.

    COLLECTOR IP

    The IP address of the Collector. This is the service that resides in the containerized repository and collects endpoint events and threat information.

    CONFIGURATION PROFILE

    The name of the config profile assigned to the endpoint. Configuration Profiles allow the ZMC administrators to control ZeroLock Agent behavior on protected Endpoints.

    GROUPS

    Are used to identify a specific set of endpoints, usually by functionality such as all database servers or by functional area (e.g.,  accounting systems or Web nodes). Assigning permissions by group enables an administrator to restrict what a ZMC user can do.

    OS

    The operating system of the endpoint.

    SW VERSION

    The version of the ZeroLock Agent that is installed.

    ACTIVITY LOG

    The Activity log consists of two (2) columns:

    • TIME is when something occurred
    • INFO is a brief description of the occurrence.
    Step_5_Activity Log

     


    SHELL

    This feature provides an administrator alternative, command prompt access to an endpoint. There may be instances when an endpoint must be isolated, or quarantined, from the company’s network to protect the integrity of that network. In the event of a malware attack, for example.

    Step_6_SHELL

    Once quarantined, the SHELL provides a means for connecting to that endpoint to determine the extent of the damage without risking the entire network.


    MAINTENANCE 

    From this screen and using the provided shortcuts ‘help’ and ‘get’, an administrator has the ability perform troubleshooting of endpoint issues, view the current list of endpoint settings, and manage the endpoint.

    Step_7_Maintenance