Running Commands On The Client Computer From The Logs - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

280
Monitoring protection with reports and logs

Running commands on the client computer from the logs

Running commands on the client computer from the
logs
To delete a saved filter
1
In the Use a saved filter list box, select the name of the log filter that you
want to delete.
2
Beside the Use a saved filter list box, click the Delete icon.
3
When you are prompted to confirm that you want to delete the filter, click
Yes.
From the Computer Status log, you can run several commands on the client
computers.
You can also right-click a group directly from the Computers page of the Symantec
Endpoint Protection Manager console to run commands.
See
About commands you can run on client computers"
See
Running commands on the client computer from the console"
From the Command Status tab, you can view the status of the commands that
you have run from the console and their details. You can also cancel a specific
scan from this tab if the scan is in progress.
You can view the status of the commands that you have run from the console and
their details. You can also cancel a specific scan from this tab if the scan is in
progress.
You can cancel all scans in progress and queued for selected clients. If you confirm
the command, the table refreshes and you see that the cancel command is added
to the command status table.
Note: If you run a scan command, and select a Custom scan, the scan uses the
command scan settings that you configured on the Administrator-defined Scans
page. The command uses the settings that are in the Virus and Spyware Protection
policy that is applied to the selected client computers.
If you run a Restart Client Computer command from a log, the command is sent
immediately. If users are logged on to the client, they are warned about the restart
based on the options that the administrator configured for that client.
See
Restarting client computers"
From the Risk log, you can also delete files from the Quarantine.
on page 80.
on page 113.
on page 114.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents