Security Management

BEFORE YOU BEGIN  To be able to see the Security Management page, you will need to configure the Kaspersky Endpoint Security (KES) Integration or the Webroot Endpoint Security Integration. For further information, refer to Kaspersky Endpoint Security Integration and Webroot Endpoint Security Integration.

IMPORTANT  Please note that the Kaspersky Endpoint Security Integration is no longer available for new implementations. Refer to Kaspersky Endpoint Security Integration.

About Security Management

Security management allows you to report on your device estate protected by Kaspersky Endpoint Security (KES) or Webroot. It allows you to see information and statistics about the current status of your devices and recently detected threats. The Security Management page becomes available once you have downloaded and configured the KES Integration or Webroot Endpoint Security Integration. For more information, refer to Kaspersky Endpoint Security Integration and Webroot Endpoint Security Integration.

Security management is available at account and site level. Navigate to:

  • Account > Manage > click the radio button for Security Management or
  • Sites > select a site > Manage > click the radio button for Security Management

You will see the following areas on the page:

Field Description
All / KES / Webroot Depending on whether you have configured KES or Webroot for your account, these radio buttons in the top right area of the Security Management page let you choose one or all of the security products.
All devices / Servers / Workstations A pie chart showing the status of All devices / Servers / Workstations secured by the selected security product.
Select one of the radio buttons to see the required device type and hover over the chart to see the number and status of the devices. Percentage numbers are also displayed in brackets.

NOTE  Click a piece in the pie chart to see statistics about those devices only in the Active threats in the last 30 days chart on the right of the page.

Active threats in the last 30 days A chart showing the number of threats on your devices in the last 30 days. Hover over a date to see the exact number.

If only KES is selected as security product, the chart will show the following:
• Active threats
• Detected threats

If only Webroot is selected as security product, the chart will show the following:
• Active threats
• Threats blocked

In our example, we selected all the security products:

NOTE  Select the required device type (All devices / Servers / Workstations) on the left of the page above the pie chart to see statistics about that device type only.

NOTE  To learn about other management options, refer to Manage your endpoints.

NOTE  For information about security management policies, refer to Create a Security Management policy.