During an Advanced Search, use the following search criteria options for Users and Endpoints.
Category |
Description |
---|---|
User name |
The account name of local users or people belonging to an Active Directory structure |
Direct manager |
The account name of the person who users are assigned to report to |
Location in Active Directory |
The organization unit from which to begin your search |
Department |
The name of the department in your company that groups users based on their function (for example, Accounting) or other criteria |
Active Directory group |
A collection of Active Directory user and computer accounts, contacts and other groups that can be managed as a single unit |
Threat type |
Select a security threat type from the third drop-down list |
Security threat |
Search for a specific security threat by typing a malware name, URL, IP address, or sender email address |
Threat status |
The remediation status indicated by the flag icon in the first column on the Security Threats screen: Resolved by product, Action required, Resolved manually For more information, see Security Threats for Users. |
Importance |
The assigned importance level For more information, see User or Endpoint Importance. |
Active Directory site |
The site name synchronized from the Active Directory For more information, see Endpoint and User Grouping. |
Reporting line |
The display name for the reporting line synchronized from the Active Directory For more information, see Endpoint and User Grouping. |
Category |
Description |
---|---|
Endpoint name |
The host or device name of the endpoint |
IP address |
The IPv4 address range Note:
Searching by IPv4 segment requires a specific range starting with the first octet. The search returns all endpoints with IP addresses containing the entry. |
Endpoint type |
The type of computer or device: server, desktop, laptop, mobile device, or other |
Operating system |
The type of operating system on the endpoint |
Location in Active Directory |
The organization unit from which to begin your search |
Threat type |
Select a security threat type from the third drop-down list |
Security threat |
Search for a specific security threat by typing a malware name, URL, IP address, or sender email address |
Threat status |
The remediation status indicated by the flag icon in the first column on the Security Threats screen: Resolved by product, Action required, Resolved manually For more information, see Security Threats on Endpoints. |
Compliance |
The antivirus pattern compliance or Data Loss Prevention compliance status For more information, see Compliance Indicators. |
Importance |
The assigned importance level For more information, see User or Endpoint Importance. |
Active Directory site |
The site name synchronized from the Active Directory For more information, see Endpoint and User Grouping. |
Reporting line |
The display name for the reporting line synchronized from the Active Directory For more information, see Endpoint and User Grouping. |
Installation mode |
The Security Agent installation mode For more information, see Downloading Security Agent Installation Packages. |
Services |
The Security Agent service For more information, see the Apex Central Widget and Policy Management Guide. |
Apex One domain hierarchy |
The location of the endpoint within the Apex One domain hierarchy |