A one page snapshot of your current Endpoint Security status for deployed agents. The dashboard displays at-a-glance information on licensing, current and top threats, and even client version information.
The Security Status area gives you a list view of agents with current status of each protection module, including the real time file protection, email protection, link protection and web protection for each agent. From here you can perform operations for each of these modules across selected agents.
There are times when administrators will need to push updates manually to an agent or group of agents and Kaseya's Endpoint Security makes that easy. From the Manual Update section you can see source locations, last update times, version info, and the next scheduled update time.
Leveraging Kaseya's automation framework, see last scan information, and scheduling scans is simple and efficient.
View Threats and Logs
Having visibility into agent threat status is imperative for proper troubleshooting and remediation. Knowing which threat is attacking an agent and where that threat is showing up on that system can speed diagnosis and help identify problematic users and/or usage patterns. Couple threat visibility with direct access to the machines logs means that admins never need to leave Kaseya to get the data they need to solve problems and protect the network.
As a separately licensed module, knowing how many Endpoint Security agents are deployed, expiring, or about to be expiring is very important. You can even extend licenses from this menu to avoid having to remove and redeploy the AV components.
Pushing out Endpoint Security to your machines is both easy and powerful. Not only can you push out Endpoint Security manually, you can schedule the installation and customize it with customizeable user prompts, and specific install options. Configurable options include:
- protection components (mail, file, web, links)
- ownership information
- software options like tray icon behavior and target directory
- auto disable of Windows Defender
- pre/post install scripts
A key benefit of Kaseya's Endpoint Security is the ability to create profiles. Profiles are configurations that can be built for use in deployment to similar groups of computers. Examples of profile uses include server profiles, laptops, desktops, even department or customer based. This allows Endpoint Security to be pre-configured for whatever scenario you require be it technical, organizational, or even financial.
The Exchange Status page displays the status of email protection on MS Exchange servers that have Kaseya Endpoint Security installed on them. During the install of Endpoint Security on a machine, if MS Exchange is detected, the plugin for MS Exchange email protection is automatically installed.
Knowing when certain Endpoint Security software/component statuses change is absolutely imperative to maintaining secure systems. Security Alarms allow the administrator to configure which events should be recognized as Security Alarms and then allows those alarm profiles to be applied to groups.
The core sets of functions performed by the Kaseya framework are: deployment, configuration, execution, update, logging, reporting, monitoring and remediation. These functions are part of the core tasks an IT professional performs on a daily basis. Kaseya's Endpoint Security leverages this framework to allow full control of your endpoint protection.
The agent-based architecture of Kaseya adds greater value than domain-bound technology. Domain-based and so-called agent-less technologies are useful in a single network where all resources are directly visible on the corporate LAN/WAN. Kaseya's technology is lightweight and forms its own, completely secure TCP connection with the server; without the need for address management, implementation of port mapping schemes at each site or the establishment of cumbersome VPNs to all the sites.
IT automation is the key for transitioning from a reactive environment to a proactive, results based IT service delivery model. Kaseya provides unparalleled automation of periodic IT tasks required to manage and maintain systems and devices. Good data drives good decisions, and having a tool that allows you to automate the process of managing your AV infrastructure is imperative. With our Endpoint Security' deep integration into the Kaseya IT Automation Framework you can schedule scans and updates to conform to any policy or requirements, and automatically respond to exceptions.
Reporting on your current AV status is built right in to Kaseya's Endpoint Security. No report configuration required, no separate app, or web page to load. It's right there. Of course Kaseya's Info Center has a deep reporting feature set that allows for: