McAfee MTP10EMB3RAA Processor Guide - Page 55

Duplicate Computers report

Page 55 highlights

Using the SecurityCenter Generation of security reports SSSSeeeelllleeeecccctttt tttthhhhiiiissss ooooppppttttiiiioooonnnn GGGGrrrroooouuuuppppssss TTTToooo ddddoooo tttthhhhiiiissss DDDDiiiissssppppllllaaaayyyy aaaallllllll tttthhhheeee ccccoooommmmppppuuuutttteeeerrrrssss oooonnnn yyyyoooouuuurrrr aaaaccccccccoooouuuunnnntttt oooorrrr oooonnnnllllyyyy tttthhhhoooosssseeee iiiinnnn tttthhhheeee sssseeeelllleeeecccctttteeeedddd ggggrrrroooouuuupppp.... How to use this report W W W Whhhheeeennnn yyyyoooouuuu wwwwaaaannnntttt ttttoooo............ DDDDoooo tttthhhhiiiissss............ ccccLLLLIouIouIouIouIbSitIbSitIbSitIbSitsssshhhhddddddddooooooopppprrrrpppeeeesssseeeeooooeeeeeeeemmmmccccnnnneeeedddduuuuiiiinnnnnnnnwwwwaaaarrrrddddrrrraaaaeeeeppppaaaattttttttttttttttssssssssooooiiiiiiiieeeeuuuutttteeeeeeeeffffffffeeeeppppiiiiyyyyyyyyttttoooommmmnnnnrrrrggggeeeeoeoeoeoerrrrggggccccccccrrrrttttrrraaaarrrrrrrroooohhhhoooooooossssmmmmaaaaiiiisssspppplllluuuuaaaammmmmmmmttttyyyyaaaaiiiiaaaannnnttttppppnnnnssssppppppppiiiittttoooonnnnnnnnttttggggcccciiiiuuuuuuuueeeettttnnnnttteeeehhhhiiiitttttttteeeessssmmmmffffffffeeeeeeeeeeeeyyyyyyyyoooonnnniiiiddddrrrrrrrrnnnnssssiiiirrrraaaassssssssnnnnttttsssmmmmttttsssshhhhnnnneeeeggggttttrrrrrrrrttttaaaaccccaaaaaaaammmmuuuuuuuuoooouuuutttteeeellllttttnnnnnnnnlllliiiibbbbsssseeeennnnoooooooonnnnnnnnsssseeeeeeeeddddeeeennnnrrrrppppiiiiiiiirrrrnnnnnnnneeeeuuuueeeessssbbbbffffggggggggddddccccppppoooorrrraaaaoooossssiiiiddddrrrraaaaaaaaffffbbbbwwwwiiiiaaaannnnaaaaccccoooottttssssnnnnuuuueeeetttteeeeoooottttddddrrrr CrCrCrCrScScScScuuuuooooeeeehhhhnnnnnnnneeeeeeeennnnffffcccciiiiwwwwiiiiggggkkkknnnnuuuuhhhhggggddddrrrriiiicccceeeeeeeeoooohhhhttttddddnnnnaaaacccciiiiaaaacccclllloooossssssssoooommmmmmmmaaaarrrreeeeppppbbbbpppplllluuuuooooaaaauuuuuuuuttttyyyytttteeeetttteeeerrrrssssrrrrttttsssseeeehhhhssssrrrraaaaeeeevvvvrrrreeeeeeeffffiiiirrrrllllsssseeeessss FFFFiiiilllltttteeeerrrr tttthhhheeee lllliiiissssttttiiiinnnngggg ttttoooo ddddiiiissssppppllllaaaayyyy oooonnnnllllyyyy ccccoooommmmppppuuuutttteeeerrrrssss rrrruuuunnnnnnnniiiinnnngggg tttthhhheeee ssssppppeeeecccciiiiffffiiiicccc ooooppppeeeerrrraaaattttiiiinnnngggg ssssyyyysssstttteeeemmmm.... FFFFiiiilllltttteeeerrrr tttthhhheeee lllliiiissssttttiiiinnnngggg ttttoooo ddddiiiissssppppllllaaaayyyy oooonnnnllllyyyy ccccoooommmmppppuuuutttteeeerrrrssss rrrruuuunnnnnnnniiiinnnngggg tttthhhheeee ssssppppeeeecccciiiiffffiiiicccc ooooppppeeeerrrraaaattttiiiinnnngggg ssssyyyysssstttteeeemmmm.... CCCCiiiiiiiCCCCmumumumuSSSSsnsnsnsnsssseeeehhhhhhhhsssseeeetttteeeelllleeeeeeeetttthhhheeeessssaaaaccccccccssssttttcccceeeellllkkkkkkkkhhhhaaaattttllll ggggiiiiggggccccttttttttttttsssshhhhrrrrhhhhhhhhlllleeeeiiiiooooffffeeeeeeeeeeeeeeeeeeeeuuuuttttnnnnooooaaaannnnccccRRRRpppptttttttthhhhaaaaeeeeffffuuuussssIIIIiiiimmmmeeeellllllllooooDDDDrrrraaaallllcccceeeeffffeeeeyyyyiiiikkkktttt....nnnnrrrr))))wwwwbbbbeeeeaaaaSSSSooooaaaaqqqqnnnnaaaaeeeexxxxnnnnuuuurrrrddddrrrreeeevvvvddddiiiibbbbrrrrnnnn....eeeeeeee))))yyyyssssuuuurrrrddddeeeemmmmaaaaccccnnnnwwwwooooppppbbbbddddllllpppphhhhuuuueeee....rrrreeeerrrrmmmmo(o(o(o(nnnnYYYYooooppppnnnnooooffffrrrruuuu....uuuuiiiittttaaaasssshhhhiiiittttmmmmnnnneeeeeeeegggguuuuggggccccssssttttoooorrrrtttthhhhoooommmmeeeeuuuuhhhhppppppppaaaassssuuuuvvvviiiifffflllltttteeeeooooeeeeeeeerrrrnnnnrrrraaaa,,,,tttteeeettttllllaaaaiiiioooohhhhnnnncccccccceeeesssshhhhaaaattttnnnnaaaallllccccllllcccceeeeoooollllaaaallllmmmmmmmmiiiiccccttttiiiikkkkaaaappppooooiiiiuuuunnnnllllEEEEttttaaaammmmmmmmeeeepppprrrr....ppppaaaaeeee((((ttttlllliiiiiiiihhhhTTTTllllccccooooaaaahhhhttttooooddddtttteeeeiiiioooooooo[[[[ggggnnnnVVVVpppprrrrooooeeeeSSSSiiiinnnnuuuunnnnSSSSssssppppEEEEaaaattttTTTTaaaannnnbbbbllllUUUUuuuulllleeeellllPPPPmmmmaaaadddd]]]]nnnnbbbbkkkktttttttteeeeoooooooorrrr CnCnCnCnuuuuhhhhmmmmeeeeccccbbbbkkkkeeeettttrrrrhhhh))))....eeee vvvveeeerrrrssssiiiioooonnnn ooooffff tttthhhheeee DDDDAAAATTTT ffffiiiilllleeee aaaannnndddd tttthhhheeee cccclllliiiieeeennnntttt ccccoooommmmppppuuuutttteeeerrrr ssssooooffffttttwwwwaaaarrrreeee ((((aaaaggggeeeennnntttt bbbbuuuuiiiilllldddd Duplicate Computers report Use this report to locate computers that are listed more than once in your reports. Duplicate listings usually result when the Total Protection Service client software has been installed more than once on a single computer or when users install it on their new computers without uninstalling it from their previous computers. Select the information that appears in this report SSSSeeeelllleeeecccctttt tttthhhhiiiissss ooooppppttttiiiioooonnnn GGGGrrrroooouuuuppppssss TTTToooo ddddoooo tttthhhhiiiissss DDDDiiiissssppppllllaaaayyyy aaaallllllll tttthhhheeee ccccoooommmmppppuuuutttteeeerrrrssss oooonnnn yyyyoooouuuurrrr aaaaccccccccoooouuuunnnntttt oooorrrr oooonnnnllllyyyy tttthhhhoooosssseeee iiiinnnn aaaa ssssiiiinnnngggglllleeee ggggrrrroooouuuupppp.... How to use this report W W W Whhhheeeennnn yyyyoooouuuu wwwwaaaannnntttt ttttoooo DDDDeeeelllleeeetttteeee dddduuuupppplllliiiiccccaaaatttteeee ccccoooommmmppppuuuutttteeeerrrrssss VVVViiiieeeewwww ddddeeeettttaaaaiiiillllssss aaaabbbboooouuuutttt aaaa ccccoooommmmppppuuuutttteeeerrrr DDDDoooo tttthhhhiiiissss SSSSeeeelllleeeecccctttt tttthhhheeee cccchhhheeeecccckkkkbbbbooooxxxx ffffoooorrrr eeeeaaaacccchhhh dddduuuupppplllliiiiccccaaaatttteeee ccccoooommmmppppuuuutttteeeerrrr lllliiiisssstttteeeedddd,,,, tttthhhheeeennnn cccclllliiiicccckkkk DDDDeeeelllleeeetttteeee.... ththththssssNNNNhhhhooooooooOOOOeeeeffffwwwwttttTTTTwwwwlllleeeeEEEEiiiissssvvvvaaaa::::tttteeeerrrriiiiDDDDnnnneeeerrrr,,,,gggg....eeeeyyyy,,,,llllIIIIeeeeooooffffiiiittttttttuuuuyyyyiiiinnnnaaaaooooccccgggguuuuuuuuaaaattttaaaannnnoooommmmmmmmccccnnnniiiissssooooooooaaaattttmmmmttttaaaalllliiiiooookkkkccccppppaaaaeeeennnnuuuullllnnnnggggllllttttyyyyeeeelllleeeeyyyyrrrrrrrrrrrrddddeeeeddddvvvvaaaaeeeeiiiiooooeeeepppplllleeeeeeewwwwppppsssstttteeeeeeeiiiinnnnaaaattttaaaassssoooorrrrsssstttthhhhccccrrrroooottttiiiisssseeeehhhhmmmmttttmmmmeeeeoooopppprrrroooonnnnuuuuiiiiccccvvvveeeettttaaaaeeeeeeeexxxxllllttttrrrrttttddddhhhhttttwwwweeeeiiiieeeemmmmiiiitttttttteeeeTTTThhhheeeeccccooootttteeeeiiiittttttttiiiiaaaaoooonnnnssssllllnnnnaaaarrrrPPPPbbbbeeeeddddrrrrllllppppeeeeooooaaaaooooddddtttttttteeeeaaaarrrrttttccccccc....llllttttddddiiiiiiiieeeeooooaaaannnnnnnnttttaaaatttt SSSSssssiiiisssseeeeoooorrrrffffuuuuvvvvttttwwwwppppiiiiccccllllaaaaeeeeoooorrrraaaaeeeeccccddddlllliiiiffffeeeeeeeerrrrddddnnnnoooo;;;;ttttmmmm CiCiCiCinnnnllllffffiiiiccccooookkkkrrrrmmmmaaaaaaaaccccttttooooiiiioooommmmnnnnppppaaaauuuubbbbttttooooeeeeuuuurrrr ttttnnnnttttaaaahhhhmmmmeeeeeeeeccccoooottttoooommmmddddppppiiiiuuuusssspppptttteeeellllaaaarrrr,,,,yyyyiiiittttttttsssshhhheeeesssseeeeCCCCrrrrvvvvooooiiiimmmmcccceeeeppppuuuuccccooootttteeeemmmmrrrrppppDDDDooooeeeennnntttteeeeaaaannnniiiillllttttsssssssspppp,,,, aaaaaaaggggnnnneeeedddd,,,, iiiiwwwwttttsssshhhhddddiiiicccceeeehhhhtttteeeeddddcccciiiittttssssiiiippppoooonnnnllllaaaassssyyyy....ssss McAfee Total Protection Service Product Guide 55

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

McAfee Total Protection Service Product Guide
55
How to use this report
Duplicate Computers report
Use this report to locate computers that are listed more than once in your reports. Duplicate
listings usually result when the Total Protection Service client software has been installed
more than once on a single computer or when users install it on their new computers without
uninstalling it from their previous computers.
Select the information that appears in this report
How to use this report
To do this...
Select this option...
Display all the computers on your account or only those in the selected group.
Groups
Do this...
When you want to...
Filter the listing to display only computers running the specific operating system.
Identify computers running an
operating system that needs an
update or patch installed
Filter the listing to display only computers running the specific operating system.
Identify computers running a
browser that needs to be updated
Select the checkbox by appropriate computer, then click
Email
to open a blank
message to fill in and send. (You must have a local email application installed to
use this feature.)
Send email notifying users about
issues or maintenance specific to
their operating system or browser
Check the name and number of the group for each computer. (The group number
is the group ID required when using the silent installation method [VSSETUP] to
install client software.)
Locate group information for
computers
Check the Relay Server column.
See which computers are
configured as relay servers
Check the version of the DAT file and the client computer software (agent build
number).
Check details about the files
running on computers
To do this...
Select this option...
Display all the computers on your account or only those in a single group.
Groups
Do this...
When you want to...
Select the checkbox for each duplicate computer listed, then click
Delete
.
NOTE:
Deleting a computer does not remove the Total Protection Service client
software. If you mistakenly delete a computer with enabled client software from
Delete duplicate computers
the listing, it automatically reappears the next time its report data is uploaded;
however, you can no longer view its historical detection data.
Click a computer name to display the Computer Details page, which displays
information about the computer, its service components, and its detections.
View details about a computer
Using the SecurityCenter
Generation of security reports