Device Control DashboardComputers endpoint device control dashboard including total successful, unreachable, failed and unknown computers protection events and software endpoint security activity status. |
Scanning Monitor ViewScan monitoring view of protected computers including endpoint security deployment and device control capabilities including online and offline protection and exclude users and media options. |
Activity Logging ReportsReal-time activity logging reports of protected computers including online and offline endpoint device control and data loss prevention events for endpoint security administration. |
Automatic Actions CapabilitiesAutomatic actions options including windows execution command email messages and syslog alerts capabilities upon receiving endpoint device control events from protected computers. |
Automatic Export CapabilitiesAutomatic exporting capabilities for text files and windows SQL/Access ODBC database including protected endpoint device control events and current protection status. |
Remote Control ViewerRemote control management console viewer option providing endpoint security administration interface from remote sites including optional administrators permissions. |
Events Removal OptionsProvide automatic notification and protection events removal options for management and administration of the collected endpoint security and device control events on the protected computers. |
Unstoppable Protection ServiceProvide optional unstoppable client protection service that prevent local computer administrators from stopping or controlling the status of the endpoint security protection service. |
DHCP Release OptionProvide automatic DHCP release option before disabling protected wireless devices to help reclaim new wireless adapters IP addresses when endpoint wireless devices being enabled. |
Client Notification MessageProvide automatic editable client notification message that will be displayed when endpoint device control protection is being activated on the protected computers. |
Auto Discovery ScanningAutomatic computers discovery and scanning options for active endpoint security and data loss prevention of network computers from domain, workgroup or IP addresses range. |
Exclude Endpoint ComputersProvide exclude computers list of computers names and IP addresses ranges that will be excluded from the selected endpoint security and data loss prevention protection rules. |
Multiple Redundant ServersProvide options end point security on multiple redundant servers for clients protection service installation on distributed environment including first available or first responsive server. |
Server Administration PermissionsProvide optional server administrations permissions that enable to control the endpoint security operations and viewing options that will be available for specific system administrators. |