Locate hosts/users
Use this option on the Locate Tab to locate hosts or users.
Option |
Description |
---|---|
Server List |
List of servers being managed. Select one or more servers to be included in the search. Click Select All to select all servers to be included in the search. Click Save Server Selections to save the list of servers you have selected for the search. |
Last Name |
The last name of a user associated with the registered host or the vendor name of a rogue host. |
IP Address |
The IP Address of the host machine. |
MAC Type |
The MAC Type for the host. The available options are: Invalid, Valid or Both. |
Connect State |
The Connect State of the adapter. Options include: Both, Off line or On line. |
Access |
The Access state of the adapter. Options include, Enabled, Disabled or Both. |
Physical Address |
The MAC Address of the adapter on the host. |
Media Type |
Searches the Media Type field in the Adapter Properties. Typically this would be either wired or wireless. |
Access Value |
Directory Attribute used when determining which security policy the hosts are scanned against. Data contained in this field is copied from the user's account in the directory to the Security and Access value field on the User, Host and Adapter Properties. It can also be entered manually. |
Name of the host machine. |
|
Version number of the Persistent or Dissolvable Agent on the host. |
|
Operating system on the host. |
|
Hardware type of the host machine. |
|
Host Type |
Narrow the search by a specific type of host: All, IP Phone, Registered or Rogue. |
Authenticated State |
Include hosts on which a user has Authenticated, Not-authenticated or Both. |
Security State |
Include hosts that are Safe, At Risk or Both. |
Persistent Agent |
The Persistent Agent usage of the host. Options include: No Agent — Hosts with no agent. Agent — Hosts using the Persistent Agent. Both — Hosts using either the Persistent Agent or the Dissolvable Agent. |
Connect State |
The Connect State of the adapter. Options include: Both, Off line or On line. |
Access |
The Access state of the host. Options include, Enabled, Disabled or Both. |
Host Role |
Name of the Role assigned to the host. Roles are used to group hosts and control their access to the network. |
Security & Access Value |
Directory Attribute used when determining which security policy the hosts are scanned against. Data contained in this field is copied from the user's account in the directory to the Security and Access value field on the User, Host and Adapter Properties. It can also be entered manually. |
First Name |
First name of the user associated with the host. |
User ID |
Unique alphanumeric ID. Typically comes from the directory but if you are not using a directory, this field can be created manually. |
Title |
User's title, this could be a form of address or their title within the organization. |
User Type |
Searches both Admin Users and network users. Options include: All, Administrative, Administrator, Operator or Helpdesk. To search network users and guests or contractors, select All. |
Sponsor |
If the administrative user performing the search has Sponsor privileges, his User Name may be filled in this field. Depending on permissions, a Sponsor's search may be limited to the hosts he created. Sponsors with the ability to view all accounts can use this field to find hosts created by a specific Sponsor by entering that Sponsor's User Name in this field. |
User Role |
Name of the Role assigned to the user. Roles are used to group users and control their network access. |
Access |
The Access state of the user. Options include, Enabled, Disabled or Both. |
Security & Access Value |
Directory Attribute used when determining which security policy the hosts are scanned against. Data contained in this field is copied from the user's account in the directory to the Security and Access value field on the User, Host and Adapter Properties. It can also be entered manually. |