Managing Endpoint Protection
You can deploy SecureAnywhere to endpoints using a variety of methods, depending on your business requirements and network size. An endpoint can be a Window...
Sun, 26 Jul, 2020 at 1:18 PM
Endpoints must use the Endpoint Protection keycode before they can report into the Management Portal. If there are endpoints in your network t...
Sun, 26 Jul, 2020 at 1:19 PM
When you add an endpoint, SecureAnywhere identifies it in the Management Portal by its machine name. You might want to change the machine name...
Sun, 26 Jul, 2020 at 1:20 PM
Use this procedure to search for a single endpoint or multiple endpoints through our dynamic and flexible search functionality. This procedure...
Sun, 26 Jul, 2020 at 1:22 PM
From the Management Portal, you can issue commands to individual endpoints or to a group of endpoints. For example, you might want to scan an ...
Sun, 26 Jul, 2020 at 1:29 PM
This section describes some special circumstances you may encounter when you change hardware and operating systems on endpoints. ...
Sun, 26 Jul, 2020 at 1:30 PM
On occasion, you may need to access an endpoint to change settings in the SecureAnywhere interface. This might be necessary if you assign an ...
Sun, 26 Jul, 2020 at 1:34 PM
From Group Management, you can view the scan history of endpoints and manage any detected threats. You can restore a file from quarantine if y...
Sun, 26 Jul, 2020 at 1:35 PM
Unlike previous versions of Webroot software, Webroot SecureAnywhere automatically downloads and installs all updates by default. When we rele...
Sun, 26 Jul, 2020 at 1:37 PM
The polling interval determines how often the endpoint sends its status and receives commands, for example, every 15 minutes or every hour. If...
Sun, 26 Jul, 2020 at 1:37 PM