Viewing your Computer Profile
Your Computer Profile page provides quick access to each of your protected computer's profile pages.
Table: Computer profile page components
Computer Identification section
This area lists the attributes of the computer:
This area is to the right of the computer identification section. It enables you to:
Change Computer Alias
Assign the computer to a new group
Only visible when agent does not have all available services installed.
View another computer
Delete (the computer and remove the agent)
Enable as Local Update Host
When a computer is a Local Update Host, the action changes to Disable as Local Update Host.
Enable as a Storage Server
Computers that are designated as storage servers must have adequate storage. The rule of thumb for capacity is 2 GB of storage for every 1GB of data protected. The additional storage enables us to keep multiple revisions and storage history for the protected computer.
The Services tab displays the settings of each service and a summary of activity. To the right is a list of Tasks available for the computer. The list of tasks varies based on the status of the computer and the service being viewed.
For Endpoint Protection, the Current Settings section visually displays configuration and status for:
The Cloud Endpoint Protection Agent configuration and status are indicated using the our standard green, yellow, and red indicators. A gray circle with a dash indicates a feature that is not active on the endpoint.
For Endpoint Protection the tasks include:
View Unresolved Risks
The status for Backup Exec.cloud indicates the state of the Backup Agent and lists relevant information:
For Backup Exec.cloud the tasks include:
Remove Backup Service.
For Onsite Storage the tasks include:
Remove Storage service.
The History tab displays activity for as much as the last 90 days, by service. Column headers relevant to each service, such as Category or Severity, act as filters for viewing events.
The Permissions tab displays information about Management Console users, their roles, and rights to use services. Click to change the permissions of the listed users.
Computer status is also provided in alerts and reports. The alerts and reports are configured according to your requirements.