EasyManua.ls Logo

Check Point HARMONY R81 - Using the Users and Computers Tree

Check Point HARMONY R81
451 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Using the Users and Computers Tree
R81 Harmony Endpoint Server Administration Guide|84
Using the Users and Computers Tree
The directory tree shows the Users and Computers hierarchy as a set folders and objects. You
use the Users and Computers tree to see and select Users and Computers objects.
The tree includes these directories by default:
n
Directories - Users and computers included in Active Directory OUs.
n
Other Users/Computers - Users and computers not included in an Active Directory.
n
Networks - Predefined ranges of IP address.
n
Deleted Users and Computers - Users and computers that were deleted from the Active
Directory.
n
Virtual Groups - Predefined Endpoint Security groups of users and computers. Members
of a Virtual Group can also be part of the Active Directory or a member of other Virtual
Groups.
n
External Users - For the Capsule Docs component, add users from outside of the
organization who can open documents in the Capsule Docs Viewer or Editor.
Permissions for these users are defined in the Capsule Docs Policy rules.
When you right-click an object in the tree, you can do some of these options that show in the
option menu, depending on the object type.
n
More Info - Open the Object Details window to see detailed rule and status information.
You cannot edit rules or Object Details on this page. You can also use the More Info
button (in the upper right-hand corner of the pane) to open this window.
n
Using the Users and Computers Tree - Remove licenses, Full Disk Encryption recovery
data, Pre-boot settings, users and logs from the selected computer. See
"Resetting a
Computer" on page89
.
n
Add to Virtual Group or Add content to Virtual Group - Add the object and its members
to a virtual group.
n
Add to Favorites or Remove from Favorites - Add or remove the selected object to the
Favorites list, located under the Users and Computers tree.
n
Full Disk Encryption - Opens a list of operations related to Full Disk Encryption, Pre-
boot, and Remote Help.
n
OneCheck User Settings - Opens a list of operations related to OneCheck User
Settings, Pre-boot, and the
"Check Point Full Disk Encryption Self-Help Portal" on
page205
.
n
Anti-Malware - Opens a list of Push Operations related to Anti-Malware, Client Settings,
and Harmony Endpoint Forensics and Remediation. See
"Push Operations" on page62
.

Table of Contents

Related product manuals