Details section (3)
The information on this tab is divided into three sections:
-
Computer: Information about the device settings. This information is provided by the Cytomic agent.
-
Security: The status of the Advanced EDR protection modules.
-
Data protection (Windows computers only): The status of the modules that protect the data stored on computers.
Computer
Field | Description |
---|---|
Risk |
For Android devices, distribution graph that shows the overall risk level for the device and the risks detected on it. See Risk assessment module lists. |
Name |
Computer name. |
Description |
Descriptive text provided by the administrator. |
IP addresses |
List of all the IP addresses (primary addresses and aliases). |
Public IP address |
IP address of the last device (router/proxy/VPN endpoint) that connected the customer network to the Internet. |
Physical addresses (MAC) |
Physical addresses of the network interface cards installed. |
Windows domain the computer belongs to. This is empty if the computer does not belong to a domain. |
|
Path to the computer in the company’s Active Directory. |
|
Group in the group tree that the computer belongs to. To change the computer’s group, click Change. |
|
Operating system |
Operating system installed on the computer. |
Virtual machine |
Shows whether the computer is physical or virtual. |
Is a non-persistent desktop |
Shows whether the operating system of the virtual machine resides on a storage device that persists between restarts or reverts to its original state instead. |
Licenses |
Cytomic product licenses installed on the computer. See Licenses for more information. |
Agent version |
Internal version of the Cytomic agent installed on the computer. |
Last bootup date |
Date when the computer was last booted. |
Installation date |
Date when the computer’s operating system was last installed. |
Last proxy used |
Access method used by Advanced EDR the last time it connected to the Cytomic cloud. This data is not updated immediately. It might take up to 1 hour for the correct value to show. |
Last connection with the Cytomic infrastructure |
Date when the client software last connected to the Cytomic cloud. The communications agent connects at least every four hours. |
Last settings check |
Date Advanced EDR last connected to the Cytomic cloud checking for changes to the settings. |
Shadow Copies |
Shows the feature status:
|
Last copy |
Shows the date and time of the last copy made. |
Last logged-in user |
Names of the user accounts that have an active session on the computer. |
Remote control |
Shows the feature status:
|
Security
This section shows the status (Enabled, Disabled, Error) of the Advanced EDR technologies that protect the computer against malware.
Field | Description |
---|---|
Protection against advanced threats, APTs, and exploits. |
|
Installation of patches and updates for Windows, macOS, and Linux operating systems and third-party applications. Detection of the patch status of the computers on the network and removal of problematic patches. |
|
Patch installation |
Indicates whether patch installation is allowed or denied on the computer, or whether the computer is a test computer for patch installation. For more information, see Cytomic Patch features |
Program blocking |
Blocking of the execution of programs considered dangerous or not compatible with the organization activity by the administrator. |
Last checked |
Date when Cytomic Patch last queried the cloud to check whether new patches had been published. |
Protection version |
Internal version of the protection module installed on the computer. |
Knowledge update date |
Date when the signature file was last downloaded to the computer. |
Hard disk encryption (Mac computers only) |
Encryption module status:
Get recovery key: Opens a dialog box that shows the ID of the recovery key associated with the computer and the corresponding recovery key. For more information, see Obtaining a recovery key. Encryption process status:
|
Authentication method (Mac computers) |
|
Connection to knowledge servers |
Status of the connection between the computer and the Cytomic servers. In case of errors, links are shown to support pages with information about the requirements that must be met. |
Data protection (Windows)
This section shows the status of the modules that protect the data stored on the computer.
Field | Description |
---|---|
Personal data monitoring |
Monitors files containing data that could identify users or company customers (Cytomic Data Watch module). |
Allow data searches on this computer |
Shows whether the computer has a settings profile assigned that enables it to receive searches for files and report their results. |
Personal data inventory |
Provided that content-based searches of files are allowed, Cytomic Data Watch parses all files contained in the supported storage media to retrieve their content and generate a database. |
|
|
Hard disk encryption |
Encryption module status:
Get recovery key: Opens a dialog box that shows the IDs of the computer encrypted disks. Click an ID to show the relevant recovery key. For more information, see Obtaining a recovery key. Encryption process status:
|
Authentication method |
|
Encryption date |
Date when the computer was fully encrypted for the first time. |
Removable storage drive encryption |
Encryption module status:
View encrypted devices on this computer: Opens a dialog box that shows the IDs of the computer encrypted external storage media. Click an ID to show the relevant recovery key. See Obtaining a recovery key. |