Web Security - Managing Protected Devices

This article explains how you can view the Device Information and Protection Status of your corporate devices by using the Mimecast Security Agent, and is intended for use by Administrators.

Organizing Protected Devices

You can organize your devices into Device Groups. For full details, see the Device Groups section of Web Security - Managing Policies.

Viewing Protected Devices

To ensure you have visibility of the most recent active devices, only those that have synchronized in the past 90 days are displayed.

Click on each section in the left-hand navigation panel to progress to each one.


You can see a list of your protected devices by using the following steps:

  1. Log on to the Mimecast Administration Console.
  2. Navigate to Web Security | Protected Devices
  3. The Status column displays each device's state:
      • Protected: The Mimecast Security Agent is operational and protecting the device.
      • Unprotected: The Mimecast Security Agent is not operational and the device is not protected.
      • Disabled: The Mimecast Security Agent has been disabled by using the disabler password.Protected Devices

        If a device is not listed, this could be due to the Prerequisites not being met, network connectivity issues, or a misconfiguration on the device.

  1. Click on a Protected Device to display the Details slide-out panel, which displays:
      • MSA Status (Windows, Windows Server, and Mac).

        Windows Server displays a Server Users tab inside the slide-out panel.

      • Device Specification
      • OS Specification
      • Network Details
        Protected Device Details
         
    •  

The protected device's details panel is useful when troubleshooting the connection for the Mimecast Security Agent, particularly the DNS server. The level of detail displayed in this tab differs according to the OS being used:

      • Windows and Mac: The Mimecast Security Agent status panel displays the icons shown below. If the connection for the Mimecast Security Agent is working, a green tick shows on the icon. A red cross across the icon means there is a connectivity issue that must be investigated. See Prerequisites.
      • iOS: Due to the information returned by iOS , the level of information displayed is limited to only basic device and OS details.
      • Windows Server: The same information is displayed as in Windows and Mac, but with a list of active server users. This is a live view of the active and disconnected users and their protection status.

Searching For a Protected Device

You can search for a device within the Protected Devices screen by using the following steps:

  1. Select Search Device Name from next to the Search field.
  2. Type the device's name (or part of the device's name).
  3. Press the Enter key, or click on the Search icon.

Purging Protected Devices

Devices that haven't synchronized for 90 days are automatically purged, but you may wish to remove redundant devices listed in your protected devices list.

If you accidentally purge a protected device, it is automatically added back the next time a synchronization is performed. This functionality requires your logon to have a Super Administrator, Full Administrator, or Partner Administrator role.

You can purge devices within the Protected Devices screen by using the following steps:

  1. Click the Tick Boxes to the left of the devices to be removed.
  2. Click on the Purge Entry button.
  3. Click on the Purge button in the confirmation dialog.

Filtering Protected Devices

The Protected Devices list can be filtered to focus on the details of specific user devices.

You can filter by Status and/or Operating System within the Protected Devices screen by using the following steps:

  1. Click on the Filters dropdown menu.
  2. You can:
      • Select one or more Status.
      • Select one Operating System. 
  1. Click on the Apply button.

    Windows Server and Windows 11 may appear as Windows 10 in the Operating System column. To correct this, you must upgrade to 1.10 or above.

Customizing Data

All data associated with Protected Devices is displayed in columns, which you can add/remove to enable you to focus on just the data you require.

You can customize the columns shown in the Protected Devices list by using the following steps:

  1. Click on the gear icon.
  2. Select/deselect the Columns you want displayed.
  3. Click on the Apply button.

     

    Customising Protected Devices

Exporting Data

You can Export Data from the Protected Devices list, by using the following steps:

  1. Click on the Export Data button.
  2. Select the data Columns to Include in the export.
  3. Select a File Format for the export file.
  4. Click on the Download button.Export Data from Protected Devices

    Up to 10,000 items can be exported at a time.

For detailed information on how to configure, optimize, integrate, and troubleshoot, see the Web Security Enablement Hub.



Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.