
GFI EndPointSecurity 7 Discovering Devices | 104
7.2.1 Computers
Screenshot 77: Computers area
This section displays device scan summary results for every scanned target computer, including:
The computer name / IP address
The user currently logged on
Protection status, i.e., whether the computer is included in a GFI EndPointSecurity protection pol-
icy
Total number of devices currently and historically connected
Number of devices currently connected.
If a scanned target computer is not included in any GFI EndPointSecurity protection policy, you can
choose to deploy a protection policy to the computer. To do this:
1. Right-click on the relevant computer name / IP address under Computer column, and select
Deploy agent(s)…
2. Select the protection policy to deploy. Click Next to continue and Finish to start deployment.
7.2.2 Devices list
Screenshot 78: Devices list area
This section displays a detailed list of discovered devices for every scanned computer, including:
Device name, description and category
Connectivity port
Connection status, i.e., whether the device is currently connected or not.
7.3 Adding discovered devices to the database
You can select one or more of the discovered devices from the Devices list and add them to the
devices database. These devices are then retrieved from this database whenGFI EndPointSecurity
Comentarios a estos manuales