During an Advanced Search, use the following search criteria options for Users and Endpoints.
|
Category |
Description |
|---|---|
|
User name |
The account name of local users or people belonging to an Active Directory structure |
|
Direct manager |
The account name of the person who users are assigned to report to |
|
Location in Active Directory |
The organization unit from which to begin your search |
|
Department |
The name of the department in your company that groups users based on their function (for example, Accounting) or other criteria |
|
Active Directory group |
A collection of Active Directory user and computer accounts, contacts and other groups that can be managed as a single unit |
|
Threat type |
Select a security threat type from the third drop-down list |
|
Security threat |
Search for a specific security threat by typing a malware name, URL, IP address, or sender email address |
|
Threat status |
The remediation status indicated by the flag icon in the first column on the Security Threats screen: Resolved by product, Action required, Resolved manually For more information, see Security Threats for Users. |
|
Importance |
The assigned importance level For more information, see User or Endpoint Importance. |
|
Active Directory site |
The site name synchronized from the Active Directory For more information, see Endpoint and User Grouping. |
|
Reporting line |
The display name for the reporting line synchronized from the Active Directory For more information, see Endpoint and User Grouping. |
|
Category |
Description |
|---|---|
|
Endpoint name |
The host or device name of the endpoint |
|
IP address |
The IPv4 address range Note:
Searching by IPv4 segment requires a specific range starting with the first octet. The search returns all endpoints with IP addresses containing the entry. |
|
Endpoint type |
The type of computer or device: server, desktop, laptop, mobile device, or other |
|
Operating system |
The type of operating system on the endpoint |
|
Location in Active Directory |
The organization unit from which to begin your search |
|
Threat type |
Select a security threat type from the third drop-down list |
|
Security threat |
Search for a specific security threat by typing a malware name, URL, IP address, or sender email address |
|
Threat status |
The remediation status indicated by the flag icon in the first column on the Security Threats screen: Resolved by product, Action required, Resolved manually For more information, see Security Threats on Endpoints. |
|
Compliance |
The antivirus pattern compliance or Data Loss Prevention compliance status For more information, see Compliance Indicators. |
|
Importance |
The assigned importance level For more information, see User or Endpoint Importance. |
|
Active Directory site |
The site name synchronized from the Active Directory For more information, see Endpoint and User Grouping. |
|
Reporting line |
The display name for the reporting line synchronized from the Active Directory For more information, see Endpoint and User Grouping. |
|
Installation mode |
The security agent installation mode For more information, see Downloading Security Agent Installation Packages. |
|
Services |
The security agent service For more information, see the Apex Central Widget and Policy Management Guide. |
|
Apex One domain hierarchy |
The location of the endpoint within the Apex One domain hierarchy |
