Beschreibung der Geräteübersicht im AV-Portal
Last adaptation to the version: 3.3 (06.2021)
- Display of the OOBE status in the Antivirus tab
- Filtering on devices with OOoBE status not ready
- New Action in quarantine: Unignore
Device Information presents information about current threats as well as information about the device.F
In the device overview all devices can be managed which are installed and assigned to the own or the customer license. Several devices can be moved at the same time and the most important device information is displayed.
The list can be sorted by clicking on the according column name.
The visualisation of a newly installed device may take a few minutes.
|Restrict the selection:|
|Displays only devices that match the search text. |
Not applied to: Operating system and status.
|Export table||Exports the table with the device overview into a xlsx file which can be downloaded afterwards via a.|
|Table settings||Leads to the tab Table Settings in the User Preferences.|
Here you can select the columns to be displayed for the tables Devices and Licenses.
|Opens a box with filter settings:|
|Display Entries||25 Number of entries per page (10, 25, 50, 100)|
|Status filter:||Displays only entries with the selected status (see below).|
|Allows different actions with the selected devices |
|Move||Moves devices to a new group. If the group is no longer part of the installed license, the license affiliation is also changed. |
|Activate||Enables Securepoint Antivirus Pro on the device|
|Deactivating||Disables Securepoint Antivirus Pro on the device|
|Delete||Deletes the device from the device management. |
Nur möglich, wenn das Gerät vorher deaktiviert wurde!
Only possible if the device has been deactivated before!
|Hostname||As stored in the operating system of the device. Links directly to Device Information.|
|Own description||As stored in the Device Information (freely definable).|
|Group||Group to which the device belongs. Links directly to Group Settings.|
|IP address||IP address of the device.|
|Domain||Domain name, if device is a member.|
|Operating System||Operating system of the device.|
|Infections||Number of reported (and untreated) infections since last contact.|
The device status update is transmitted every 10 minutes.
The AV client sends the virus status to the dashboard every 60 seconds.
Further device information can be displayed by clicking on the device name. These are divided into different sections. By clicking on the Basic Information, Antivirus or Operating System tabs you will get the corresponding information. The version information is compared with the data from the update servers and indicates which modules are on which update status.
In the viruses Quarantine area, current threats are displayed. Threats with which an action has been performed (e.g. Delete and Save) will be displayed at viruses History.
In the Exclusions tab, files, folders or processes can be excluded from the scan.
The Versions section displays the installed and the latest versions of various components of Antivirus Pro:
- Scan Engine
- AntiSPAM Engine
- Virus database
- SPAM database
Wenn die installierte Version nicht mit der neusten Version übereinstimmt, sollte ein Update auf dem Client durchgeführt werden. Ggf. kann hier ein Problem im Update-Prozess erkannt werden.
The basic informations display important informations about the device and settings for notifications.
|Own designation||A free designation can be entered.|
|Hostname||As stored in the operating system of the host|
|IP address||IP address in the local network of the host|
|Domain||if applicable, display of the domain in which the device is a member|
|Client Password||Shows whether the client is protected with a password against modification / uninstallation.|
|Last communication||Date and time of communication between client and portal|
|Installed at||Date and time of installation|
|Letzte Übertragung der Konfiguration||Last transfer of the configuration from the portal to the client|
|Customer||Linked to the associated customer administration in the reseller portal|
|Groups||Links to the corresponding group in the group management in the AV portal and displays all devices belonging to this group.|
Also shows the ↳ configuration profile associated with this group, which is linked to edit with
The tab Antivirus contains the information about the Securepoint Antivirus Client.
The information whether the license is active, the client is currently running or a threat has been found is highlighted in color.
|License active||Activated, with valid and active license|
|Threats||7||Number of reported threats|
The line is highlighted in red if threats are found.
|Real-time scan||Checkbox activated, if function activated in client|
The line is highlighted in yellow if the function is disabled in the client.
|Real-time PUA scan||Checkbox activated, if function activated in client|
The line is highlighted in yellow if the function is disabled in the client.
|E-Mail Scan||Checkbox activated, if function activated in client|
|OOBE condition||Ready||Indicates whether the Out of box experience condition is ready and the AV is allowed to perform scans with it. |
For more information, see the wiki article on OOBE condition.
The operating system information contains information about the operating system on which the Securepoint Antivirus Pro Client is installed.
|Operating System||Name of the operating system|
|Architecture||32- or 64-bit|
|Type||Workstation, Exchange-Server, Domain-Controller|
|Service Pack Version||Version of the Installed Service Pack|
Shows various information about found viruses.
The listing can be sorted by column headings.
With the button various actions can be triggered on the host for those entries marked with .
|Source||File: Virus / Potentially Unwanted Application is contained in a file|
|Outlook||Threat is contained in an email|
|SharePoint||Threat is contained in a SharePoint object|
|PUA (Possible Unwanted Application)|
|Designation||EICAR-Test-File||Name of the file by the Ikarus engine. Please note: The names of viruses and PUAs can differ between different antivirus programs.|
|File path / subject||C:\...||Local file path on the device with AV Client|
|File size||68 B||Size of the infected file|
|Date found||14.04.2020 12:26:19|
|Status||exists||Access to the object is blocked. No actions have been performed so far|
|ignored||Object was found, but the access was temporarily (until the next restart of the Antivirus Pro service) released again.|
|deleted||The object was deleted.|
|copy exists||A backup copy has been made and access to it has been blocked. The original object was deleted.|
|file is missing||The file was removed on the host system (without executing it).|
|Actions||Displays the details of the scan profile and whether the individual settings are synchronized between the portal and the client.|
|Performs one of the following actions|
|Delete||Deletes the object definitely from the system.|
|Backup and delete||Files: Creates a backup copy, blocks access to it and deletes the original object. This allows the file to be restored to its original location if necessary.|
E-mails: Creates a backup copy, blocks access to it and deletes the mail. If required, the e-mail can be saved in .msg format to a selectable location.
SharePoint: The Sharepoint server blocks the upload and warns the user.
|Ignore||Temporarily releases the selected files (until the next restart of the Antivirus Pro service)|
|Unignore||as of version 3.3 Cancels the previously selected share of a file already before a reboot.|
|Restore||Restores the file to its original location. The status changes to exists}|
|Send to lab||The suspicious file is sent to the analysis laboratory. An email address for feedback can be provided upon request. The status does not change.|
|Remove from List||Removes entries from the quarantine list. These entries are then only in the |
|Purge||Is like "Backup and Delete": It creates a backup copy of the file, and then deletes the original. Additional removes virus entries from the registry. The process can take much longer.|
|Run suggestions||Carry out the recommendation. Vorlage:Hint Especially advantageous in case of several marked threats via the button on the left at the beginning of the table!|
|Type||Kind of exclusion. Defined in the configuration profile or directly in the client:|
|File & folder path||c:\|
|Action|| Adds exclusions from the device to the profile. |
Once defined exclusions can be transferred to all devices that are assigned to the same profile.
The current settings on the client are displayed here.
|Copy device settings to profile||Copies the device settings to the profile assigned to the device|
|synchronous||The settings in the machine and in the profile are identical.|
|asynchronous||The settings in the device and in the profile are not identical.|
|Monitoring the system||Can be disabled in the Guard section.|
|PUA and PUP detection||Can be disabled in the Guard section.|
|System monitoring after reboot||Can be deactivated in the Tools menu → Settings / tab.|
|Use default settings||Can be deactivated in the Tools menu → Settings / tab.|
|Maximum file size (In MB)||-||Size in MB up to which files are scanned.|
nn Default value in the default settings 128 MB
|Participate in signature quality assurance||Can be deactivated in the Tools menu → Settings / tab.|
|Monitoring emails||Can be deactivated in the Tools menu → Settings /.|
|Save infected attachments||Can be deactivated in the Tools menu → Settings /.|
|Enable Anti-SPAM||Can be activated in the menu Extra → Settings / Tab.|
|Check online||Additionally checks against online blacklists and databases. Requires more time.|
|Action on SPAM email||Mark email||Can be configured in the Extra menu → Settings / tab|
|Possible Spam Scoring||3||Can be configured in the Extra menu → Settings / tab|
|Spam Scoring||7||Can be configured in the Extra menu → Settings / tab|
|Log system supervision in the main log||Can be activated in the Tools menu → Settings / tab.|
|Record logs for scans||Can be activated in the Tools menu → Settings / tab.|
|Record all data when scanning||Can be activated in the Tools menu → Settings / tab.|
|Overwrite logs||Can be activated in the Tools menu → Settings / tab.|
|Use Proxy-Server||Can be activated in the Tools menu → Settings / tab.|
|Use System Proxy||Can be activated in the Tools menu → Settings / tab.|
|Proxyserver Address||-||Can be activated in the Tools menu → Settings / tab.|
|Proxyserver port||-||Can be activated in the Tools menu → Settings / tab.|
|Proxyserver login||Can be activated in the Tools menu → Settings / tab.|
|Password protection||Can be activated in the Tools menu → Settings / tabat Password protection.|
Comments and Muting
|Annotation text||Annotation about the device (independent of muting)|
|Muting||Enables or disables muting.|
|Muted until||By clicking in the input field, you can set a time until which the mute function should remain active. In calendar pop-up a month and a day can be selected. Click to select a time. By default the current time is used. Click on the red buttons or on the values to change them.|
Selection of the notification type:
Any notification for this device
Notifications about outdate status
Notifications about new threats
Notifications about insufficient security status
Accept the settings with Save