0
()

Instructions what to do when you want to make sure that everything is alright in customer environments.

To make sure that the system status is okay in all organizations that you monitor:

    1. Log in to the portal with your email address and password.

The Home view opens.

    1. Check the Devices at risk pane.

The Devices at risk pane includes up to 5 hosts that have the highest risk score in the selected organisation scope. In the partner level, the Devices at risk pane combines details from all companies under the selected partner organisation. In the company level, only hosts from selected company are included. The risk is based on events that sensors have detected during the last 30 days. The pane also shows the total number of hosts that have open detections, which have been created during last 30 days. You can use the Devices at risk pane to quickly access detections in affected hosts. Select the host name to view all risk levels or select the risk level in the Open Detections column to view only the selected risk level events.

    1. Check the Overview pane.

The Overview pane keeps you informed on what has happened in the organizations that you manage during either the last 24 hours or the last 30 days. Based on the currently selected scope, the Overview pane shows overview of all organizations or only the selected organization.

Companies
Shows the number of monitored companies.
Devices
Shows the number of monitored devices in the monitored companies.

Tip: Click the number to view the list of devices.

Total events
Shows the number of monitored events that have been detected.
Detections
Shows the number of suspected incidents.

Tip: Click the number to view the list of detections.

Software
Shows the number of currently active applications in monitored hosts.

Tip: Click the number to view the list of software.

Potentially unwanted software
Shows the number of currently active applications that are not directly malicious but can affect privacy and compromise the security of the host.
Harmful software
Shows the number of currently active malware and malicious applications in monitored hosts.
    1. Check the detection statistics panes that include the breakdown of open detections by their risk level, detection status, and detection type during either the last 24 hours or the last 30 days.
    2. Select the Detections tab and open the List view to make sure that there are no detections that would need a response.

      Note: Use search fields to narrow the results.

        1. Select arrows in the Risk column to sort detections by their risk level.

      Make sure that the list does not have any unhandled high risk items.

        1. Select arrows in the Detected column to sort detections by their date.

      Check the latest detections to make sure that the list does not have a lot of new, unhandled detections.

    3. Go to the Devices view of the customer organization that you want to check to view its current state.

Make sure that the customer organization does not have any detections that are not closed or monitored.

  1. Go through all customer organizations that you want to check in the same way.

Source : Official F-Secure Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating / 5. Vote count:

No votes so far! Be the first to rate this post.

(Visited 3 times, 1 visits today)
Discover More help  Remote installation using third-party management tools (F-Secure)