McAfee MTP10EMB3RAA Processor Guide - Page 38

Working with an individual computer

Page 38 highlights

Using the SecurityCenter Management of client computers To... Do this... administrators can search only the groups their site administrator has assigned to them. Add one or more computers Click Install Protection to open the install wizard, which guides you through the steps for installing protection on new or existing computers. View or edit details for a computer Click a computer name to display the Computer Details page for that computer. Send email to users about their computer's problems or tasks they need to perform Click an email address for a computer. Alternatively, select the checkbox for multiple computers in the list, then click the Email button. A blank preaddressed email message appears. (You must have a local email application installed to use this feature.) Delete obsolete or duplicate computers from the listing Select the checkbox for one or more computers in the list, then click Delete. NOTE: Deleting a computer does not remove the Total Protection Service client software. If you mistakenly delete a computer with enabled client software from the listing, it automatically reappears the next time its report data is uploaded; however, you can no longer view its historical detection data. Block unauthorized computers from receiving updates Select the checkbox for one or more computers in the list, then click Block. Unblock computers from receiving updates Select Computer status | Blocked to list all blocked computers, then select the checkbox for one or more computers and click Unblock. Move computers into a group Select the checkbox for one or more computers in the list, then select an existing group from the Move to Group list. Assign a policy to computers Select the checkbox for one or more computers in the list, then select an existing policy from the Policy list. View detections for a computer Click a quantity under Detections to open the Detections List, then click a detection name to view detailed information from the McAfee Avert® Labs Threat Library. Add user-approved applications to one or more policies 1 Click a quantity under User-Approved Applications. 2 In the User-Approved Applications List, click Allow, select the policies to add the approved applications to, then click Save. NOTE: The User-Approved Applications List shows detected programs that users have approved to run on the computer. To prevent users from approving applications, configure policy options for Protect mode. Working with an individual computer Use this task to manage an individual computer on the Computer Details page. This page displays information about the computer, its service components, and its detections. 38 McAfee Total Protection Service Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

38
McAfee Total Protection Service Product Guide
Using the SecurityCenter
Management of client computers
Working with an individual computer
Use this task to manage an individual computer on the
Computer Details
page. This page
displays information about the computer, its service components, and its detections.
Do this...
To...
administrators can search only the groups their site
administrator has assigned to them.
Click
Install Protection
to open the install wizard,
which guides you through the steps for installing
protection on new or existing computers.
Add one or more computers
Click a computer name to display the Computer Details
page for that computer.
View or edit details for a computer
Click an email address for a computer. Alternatively,
select the checkbox for multiple computers in the list,
Send email to users about their computer's problems
or tasks they need to perform
then click the
Email
button. A blank preaddressed email
message appears. (You must have a local email
application installed to use this feature.)
Select the checkbox for one or more computers in the
list, then click
Delete
.
NOTE:
Deleting a computer does not remove the Total
Protection Service client software. If you mistakenly
Delete obsolete or duplicate computers from the listing
delete a computer with enabled client software from
the listing, it automatically reappears the next time its
report data is uploaded; however, you can no longer
view its historical detection data.
Select the checkbox for one or more computers in the
list, then click
Block
.
Block unauthorized computers from receiving updates
Select
Computer status | Blocked
to list all blocked
computers, then select the checkbox for one or more
computers and click
Unblock
.
Unblock computers from receiving updates
Select the checkbox for one or more computers in the
list, then select an existing group from the
Move to
Group
list.
Move computers into a group
Select the checkbox for one or more computers in the
list, then select an existing policy from the
Policy
list.
Assign a policy to computers
Click a quantity under
Detections
to open the
Detections List, then click a detection name to view
View detections for a computer
detailed information from the McAfee Avert
®
Labs
Threat Library.
Add user-approved applications to one or more policies
1
Click a quantity under
User-Approved
Applications
.
2
In the User-Approved Applications List, click
Allow
, select the policies to add the approved
applications to, then click
Save
.
NOTE:
The User-Approved Applications List shows
detected programs that users have approved to run on
the computer. To prevent users from approving
applications, configure policy options for Protect mode.