Management and Security powered by Landesk

What happens on a device with Endpoint Security

This section describes how the Endpoint Security client displays on managed devices, what happens on end user devices when they are being protected by Endpoint Security, and the actions end users can take when a security violation is discovered.

Client user interface

Once Endpoint Security has been deployed to managed devices, the client can be accessed through either the Start menu or the system tray icon.

IMPORTANT: Administrator password protection
If the administrator has enabled the password protection option in the Endpoint Security settings, the correct password must be entered in order to access and use certain client features.

End user actions

The client is displayed in a window that includes the following elements, where the end user can:

  • View Protection status for Endpoint Security components (home view)
  • View program activity (reports view, Program activity)
  • View startup applications (reports view, Startup applications)
  • View the Ivanti trusted file list (reports view, Trusted file list)
  • View the detailed Endpoint Security activity log for your computer (reports view, Detailed activity)
  • Request that the Ivanti administrator grant an exception for a blocked file (reports view, Detailed activity, right-click the blocked file notification and click Request exception)

Administrator notifications on Endpoint Security activity

Use the Security activity tool's Application control section (Tools > Security and Compliance > Security activity) to view Endpoint Security notifications. If there are endpoint security actions that may need your attention, you will also see a notification when you log in to the Endpoint Security for Endpoint Manager console.

 


Was this article useful?    

The topic was:

Inaccurate

Incomplete

Not what I expected

Other