- Using dashboards
- Managing alerts across Cylance Endpoint Security services
- Managing users, devices, and groups
- Manage CylancePROTECT Desktop and CylanceOPTICS devices
- Manage zones
- Manage devices with the CylancePROTECT Mobile app
- Manage CylancePROTECT Mobile app and CylanceGATEWAY users
- View CylanceAVERT user details
- Manage user groups
- Configure device lifecycle management
- View a list of applications installed on CylancePROTECT Desktop devices
- Remove a registered FIDO device for a user account
- Discover unprotected devices
- Managing threats detected by CylancePROTECT Desktop
- Managing threats detected by CylancePROTECT Mobile
- Managing safe and unsafe lists for CylancePROTECT Desktop and CylancePROTECT Mobile
- Add a file to the CylancePROTECT Desktop global quarantine or global safe list
- Add a file to the CylancePROTECT Desktop local quarantine or local safe list
- Add a certificate to the CylancePROTECT Desktop global safe list
- Add an app, certificate, IP address, domain, or installer source to the CylancePROTECT Mobile safe or restricted list
- Analyzing data collected by CylanceOPTICS
- Using CylanceOPTICS to detect and respond to events
- Monitoring network connections with CylanceGATEWAY
- Monitoring sensitive files with CylanceAVERT
- View mobile OS vulnerabilities
- Auditing administrator actions
- Managing logs
- Send events to a SIEM solution or syslog server
- Enable access to the Cylance User API
- Troubleshooting Cylance Endpoint Security
- Using the BlackBerry Support Collection Tool
- Using the Report a problem feature
- Removing the BlackBerry Connectivity Node software from Cylance Endpoint Security
- Troubleshooting CylancePROTECT Desktop
- Remove the CylancePROTECT Desktop agent from a device
- Re-register a Linux agent
- Troubleshoot update, status, and connectivity issues with CylancePROTECT Desktop
- A large number of DYLD Injection violations are reported by Linux devices
- Time zone variances for CylancePROTECT Desktop
- Folder exclusions when using CylancePROTECT Desktop with third-party security products
- Linux driver is not loaded. Upgrade the driver package.
- Troubleshooting CylanceOPTICS
Sending actions to a device
You can use the remote response feature to securely execute scripts and run commands on any
CylanceOPTICS
-enabled device directly from the management console, using a familiar command line interface.When you start a remote response session, the
CylanceOPTICS
agent creates an instance of the device’s native shell (cmd for Windows
, bash for macOS
and Linux
) and handles the transfer of commands to and from the shell. As a result, you have access to the functions of the native shell and the apps and scripts that are available on the device. CylanceOPTICS
also provides some reserved commands that you can use to transfer files to and from the device.A remote response session can be initiated only with a device that is online and will time out after 25 minutes of inactivity. Multiple sessions can be open for the same device at the same time, to a maximum of 50.
Remote response provides a high level of access to a device, so use caution when you issue commands and comply with your organization’s security policies. When you use remote response, the details of the session, including the commands that are sent, information about file transfers, and the responses that are received, are recorded in the device log that you can access from the management console. The log file is retained for 30 days.