- Using dashboards
- Managing users, devices, and groups
- Manage CylancePROTECT Desktop and CylanceOPTICS devices
- Manage zones
- Manage devices with the CylancePROTECT Mobile app
- Manage CylancePROTECT Mobile app and CylanceGATEWAY users
- Managing CylanceAVERT users
- Manage user groups
- Configure device lifecycle management
- Remove a registered FIDO device for a user account
- Discover unprotected devices
- Managing threats detected by CylancePROTECT Desktop
- Managing threats detected by CylancePROTECT Mobile
- Managing safe and unsafe lists for CylancePROTECT Desktop and CylancePROTECT Mobile
- Add a file to the CylancePROTECT Desktop global quarantine or global safe list
- Add a file to the CylancePROTECT Desktop local quarantine or local safe list
- Add a certificate to the CylancePROTECT Desktop global safe list
- Add an app, certificate, IP address, or domain to a CylancePROTECT Mobile safe or restricted list
- Analyzing data collected by CylanceOPTICS
- CylanceOPTICS sensors
- Data structures that CylanceOPTICS uses to identify threats
- View devices that are enabled for CylanceOPTICS
- Using InstaQuery and advanced query to analyze artifact data
- View focus data
- View and download files that CylanceOPTICS has retrieved
- Using CylanceOPTICS to detect and respond to events
- Create a detection rule set
- View and manage detections
- Creating custom detection rules
- Create a detection exception
- Deploy a package to collect data from devices
- Create a package playbook to respond to events
- Lock a device
- Sending actions to a device
- Monitoring network connections with CylanceGATEWAY
- Monitoring sensitive files with CylanceAVERT
- View mobile OS vulnerabilities
- Auditing administrator actions
- Managing logs
- Send events to a SIEM solution or syslog server
- Enable access to the Cylance User API
- Troubleshooting Cylance Endpoint Security
- Using the BlackBerry Support Collection Tool
- Removing the BlackBerry Connectivity Node software from Cylance Endpoint Security
- Troubleshooting CylancePROTECT Desktop
- Remove the CylancePROTECT Desktop agent from a device
- Troubleshoot update, status, and connectivity issues with CylancePROTECT Desktop
- A large number of DYLD Injection violations are reported by Linux devices
- Time zone variances for CylancePROTECT Desktop
- Folder exclusions when using CylancePROTECT Desktop with third-party security products
- Linux driver is not loaded. Upgrade the driver package.
- Troubleshooting CylanceOPTICS
Discover unprotected devices
You can use the management console to view a list of known devices, discovered from
Active Directory, that are not protected by
CylancePROTECT Desktop. Known devices that are running an OS version that supports the installation of
CylancePROTECTare indicated. You can also export the device list and take necessary actions (for example, install
CylancePROTECT) on those devices to protect those devices and your network from potential threats.
Ensure that you have enabled the Unprotected Device Discovery service. For more information, see Enable unprotected device discovery.
- In the management console, on the menu bar, clickAssets > Unprotected Devices.The protection control status of the device can be any of the following:
- Supported: The discovered device is running an OS version that is supported byCylancePROTECT Desktop.
- Unsupported: The discovered device is not running an OS version that is supported byCylancePROTECT Desktop.
- Insufficient info: Not enough information is available to determine if the OS version that is running on the device is supported byCylancePROTECT Desktop.
- Do any of the following:
- To add or remove columns, click and select the columns that you want to view.
- To filter any of the columns, click in the column heading.
- To export the unprotected devices to a .csv file, click . You can export all of the table columns or selectCurrent filtersto export only the filtered columns. ClickExport.