- Using dashboards
- Managing users, devices, and groups
- Managing threats detected by CylancePROTECT Desktop
- Managing threats detected by CylancePROTECT Mobile
- Managing safe and unsafe lists for CylancePROTECT Desktop and CylancePROTECT Mobile
- Add a file to the CylancePROTECT Desktop global quarantine or global safe list
- Add a file to the CylancePROTECT Desktop local quarantine or local safe list
- Add a certificate to the CylancePROTECT Desktop global safe list
- Add an app, certificate, IP address, or domain to a CylancePROTECT Mobile safe or restricted list
- Analyzing data collected by CylanceOPTICS
- Using CylanceOPTICS to detect and respond to events
- Managing user risk with CylancePERSONA Desktop
- Monitoring network connections with CylanceGATEWAY
- View mobile OS vulnerabilities
- Auditing administrator actions
- Managing logs
- Send events to a SIEM solution or syslog server
- Enable access to the Cylance User API
- Troubleshooting Cylance Endpoint Security
Start a remote response session
- In the management console, on the menu bar, clickCylanceOPTICS > Devices.
- Find the device and click the device name.
- In theSelect Actiondrop-down list, clickRemote Response.
- Enter commands in the remote response session window.For more information about reserved commands forCylanceOPTICS, see Reserved commands for remote response.
If you want to download the device log with the record of the remote response session, on the menu bar, click
CylanceOPTICS > Action History
. Find the device and click Download Log
.