Accessing the User Tree

  1. Access the Control Manager management console.
  2. Navigate to Directories > Users/Endpoints.
  3. Go to Users > All.

A screen similar to the following appears:



Column Name

Description

User

The name or email address of the user depending on the endpoint:

  • Computer/server: The most recent user who logged on and/or used the computer/server is identified as the current owner.

  • Mobile device: The email address associated with the mobile device is used to find the corresponding user in Active Directory. If the corresponding AD user cannot be found or if AD synchronization is not available, the email address is used as the current owner.

Click the name to open the User Details > Contact Information screen. Refer to Displaying User Details for details.

Note:

The Users > All node list all local users from various endpoints regardless of their duplicate status. Duplicate users Users having the same names can occur Control Manager consolidates all endpoints from managed products having multiple local users.

Domain

If Active Directory integration is enabled, this corresponds to the name of the domain. Without Active Directory, the value in this column reflects the endpoint name/host name.

Manager

The user's direct reporting manager, as saved in Active Directory

Endpoints

The number of endpoints, which the user is currently logged on to or was the last one to log on.

Security Threats

The total number of threats logged in 90 days

Click the value to display the User Details > Security Threats screen. Refer to Security Threats for details.

Control Manager counts and consolidates detections having these types of threats:

  • Virus/Malware

  • Spyware/Grayware

  • Content violation

  • Spam

  • Phishing email

  • Web violation

  • DLP incident

  • C&C callback

  • Behavior Monitoring violation

  • Firewall violation

For example, while Henry is the last user using endpoint us-mkt-dev1, there are 10 virus/malware detections and two web violations. Because Henry was the last one to use the endpoint, Henry's security threats count is 12.

Note:

If the network environment is not using Active Directory the following detections/violations for gateway products do not display: content violation, phishing email, spam.

Associated Policies

The number of policies assigned to endpoints, which the user is currently logged on to or was the last one to log on.

Click the value to display the User Details > Policy Status screen. Refer to Policy Status for details. The Policy Status displays the list of policies and their status that are related to an endpoint, including the managed product where such policy originates, its version and build.