Management Of Computer Groups - McAfee TSA00M005PAA - Total Protection Service Product Manual

Processor guide
Hide thumbs Also See for TSA00M005PAA - Total Protection Service:
Table of Contents

Advertisement

Using the SecurityCenter

Management of computer groups

Task
For option definitions, click ? in the interface.
1 From a computer listing, such as the Computers page, click a computer name.
2 On the Computer Details page, do any of the following:
To...
Update the email address
Move the computer to a new group
Assign a new policy
Install protection on an unprotected computer
Display instructions for resolving an action item
Display details about detections
Add user-approved applications to one or more policies 1
View attempted visits to blocked websites
Management of computer groups
A group consists of one or more computers that share a particular feature. You can base
groups on geographic location, department, computer type, the tasks performed by the users,
or anything meaningful to your organization.
By default, every computer in your account is placed into a group called Default Group. You
can create other groups to place them in instead.
Why use groups?
Groups help you manage large numbers of computers or computers that use different
security settings (defined in policies). Groups are particularly helpful in larger organizations or
companies that are widely distributed geographically. Placing similar computers into a single
group enables you to view and manage security issues for the group separately from the other
computers in your account.
McAfee Total Protection Service Product Guide
Do this...
In the System email address box, type a new email
address, then click Save.
In the Group list, select a group, then click Save.
In the Policy list, select a new policy, then click Save.
Select the Click here to install link to open the
installation wizard.
Under Action Items, click the action item.
In the Detections section, click a quantity under
Detections or User-Approved Applications to
display a detailed listing.
In the Detections section, click a quantity under
User-Approved Applications.
2
In the User-Approved Applications List, click
Allow, select the policies to add the approved
applications to, then click Save.
NOTE:
The User-Approved Applications List shows
detected programs that users have approved to run on
the computer. To prevent users from approving
applications, configure policy options for Protect mode.
In the Detections section, click a quantity under
Blocked Sites to open a page that lists details about
each attempted visit.
NOTE:
This feature is available only when web browsing
policy options are enabled in versions of Total Protection
Service that include the web browsing module.
39

Advertisement

Table of Contents
loading

Table of Contents