Details section (3)
The information on this tab is divided into three sections:
-
Computer: Information about the device settings. This information is provided by the Cytomic agent.
-
Security: The status of the Advanced EPDR protection modules.
-
Data protection (Windows computers only): The status of the modules that protect the data stored on computers.
Computer
Field | Description |
---|---|
Risk |
For Android devices, distribution graph that shows the overall risk level for the device and the risks detected on it. See Risk assessment module lists. |
Name |
Computer name. |
Description |
Descriptive text provided by the administrator. |
IP addresses |
List of all the IP addresses (primary addresses and aliases). |
Public IP address |
IP address of the last device (router/proxy/VPN endpoint) that connected the customer network to the Internet. |
Physical addresses (MAC) |
Physical addresses of the network interface cards installed. |
Windows domain the computer belongs to. This is empty if the computer does not belong to a domain. |
|
Full path to the computer in the company's Active Directory. |
|
Last discovered in Active Directory |
Last date when Advanced EPDR accessed Active Directory to check the computer membership. |
Folder in the group tree to which the computer belongs. To change the computer’s group, click Change. |
|
Operating system |
Full version of the operating system installed on the computer. |
Virtual machine |
Shows whether the computer is physical or virtual. |
Is a non-persistent desktop |
Shows whether the operating system of the virtual machine resides on a storage device that persists between restarts or reverts to its original state instead. |
Licenses |
Cytomic product licenses installed on the computer. See Licenses for more information. |
Agent version |
Internal version of the Cytomic agent installed on the computer. |
Last bootup date |
Date when the computer was last booted. |
Installation date |
Date when the computer’s operating system was last installed. |
Last proxy used |
Access method used by Advanced EPDR the last time it connected to the Cytomic cloud. This data is not updated immediately. It might take up to 1 hour for the correct value to show. |
Last connection |
Date when the client software last connected to the Cytomic cloud. The communications agent connects at least every four hours. |
Last settings check |
Date Advanced EPDR last connected to the Cytomic cloud checking for changes to the settings. |
Shadow Copies |
Shows the feature status:
|
Last copy |
Shows the date and time of the last copy made. |
Last logged-in user |
Names of the user accounts that have an active session on the computer. |
Remote control |
Shows the feature status:
|
Security
This section shows the status (Enabled, Disabled, Error) of the Advanced EPDR technologies that protect the computer against malware.
Field | Description |
---|---|
Status of the protection against advanced threats, APTs, and exploits. Configured mode (Audit, Hardening, Lock). |
|
File antivirus |
Status of the protection for the file system. |
Status of the actions for mitigating data exposure in the event of theft of a mobile device. This feature is not available for iOS devices not installed with an MDM solution. See Installation on iOS systems. |
|
Mail antivirus |
Status of the protection for the protocols used for sending and receiving email messages. |
Web browsing antivirus |
Status of the protection against malware downloaded from web pages. This feature is not available for iOS devices not installed with an MDM solution. See Installation on iOS systems. |
Status of the protection for the network traffic generated by applications. |
|
Status of the protection against infections originating from external storage devices or devices that enable computers to connect to the Internet without passing through the organization communications infrastructure (modems). |
|
Status of the protection that enables you to prevent access to unauthorized web pages. This feature is not available for iOS devices not installed with an MDM solution. See Installation on iOS systems. |
|
Status of the feature to install patches and updates for Windows, macOS, and Linux operating systems and third-party applications. Detection of the patch status of the computers on the network and removal of problematic patches. |
|
Patch installation |
Indicates whether patch installation is allowed or denied on the computer, or whether the computer is a test computer for patch installation. For more information, see Cytomic Patch features |
Last checked |
Date when Cytomic Patch last queried the cloud to check whether new patches had been published. |
Program blocking |
Status of the feature to block the execution of programs considered dangerous or not compatible with the organization activity. |
Script blocking |
Status of the script blocking feature. |
Protection version |
Internal version of the protection module installed on the computer. |
Knowledge update date |
Date when the signature file was last downloaded to the computer. |
Hard disk encryption (Mac computers only) |
Encryption module status:
Get recovery key: Opens a dialog box that shows the ID of the recovery key associated with the computer and the corresponding recovery key. For more information, see Obtaining a recovery key. Encryption process status:
|
Authentication method (Mac computers) |
|
Connection to knowledge servers |
Status of the connection between the computer and the Cytomic servers. In case of errors, links are shown to support pages with information about the requirements that must be met. |
Data protection (Windows)
This section shows the status of the modules that protect the data stored on the computer.
Field | Description |
---|---|
Personal data monitoring |
Status of the feature to monitor files that contain data that could identify users or company customers (Cytomic Data Watch module). |
Allow data searches on this computer |
Shows whether the computer has a settings profile assigned that enables it to receive searches for files and report their results. |
Personal data inventory |
Provided that content-based searches of files are allowed, Cytomic Data Watch parses all files contained in the supported storage media to retrieve their content and generate a database. |
|
|
Hard disk encryption |
Encryption module status:
Get recovery key: Opens a dialog box that shows the IDs of the computer encrypted disks. Click an ID to show the relevant recovery key. For more information, see Obtaining a recovery key. Encryption process status:
|
Authentication method |
|
Encryption date |
Date when the computer was fully encrypted for the first time. |
Removable storage drive encryption |
Encryption module status:
View encrypted devices on this computer: Opens a dialog box that shows the IDs of the computer encrypted external storage media. Click an ID to show the relevant recovery key. See Obtaining a recovery key. |