Manage CylancePROTECT Desktop and CylanceOPTICS devices Skip Navigation

Manage
CylancePROTECT Desktop
and
CylanceOPTICS
devices

You can use the management console to view and manage devices with the
CylancePROTECT Desktop
agent and the
CylanceOPTICS
agent from the
Assets > Devices
screen. Devices appear on this screen if they have successfully installed the agent and therefore registered with the management console. You can search for devices, export a device report, and perform actions on them.  For example, you might want to export a list of devices that are running unsupported agents. Or, you can quickly add devices to another zone to ensure they are assigned an appropriate device policy according to their zone.
  1. In the management console, on the menu bar, click
    Assets > Devices
    .
    A list of all devices is displayed.
  2. Optionally, customize the columns displayed in the device grid.
    • To add or remove columns, click The Column icon. and select the columns that you want displayed.
    • To rearrange the order of the columns, drag the column names to the position that you want.
    • To sort by ascending or descending order, click the name of a column.
  3. To perform actions on devices, do any of the following:
    Task
    Steps
    View device details.
    Click a device name.
    Assign a device policy to devices.
    A device can be associated with one device policy only. If you assign a new device policy to a device, it replaces the previous device policy.
    1. Select one or more devices.
    2. Click
      Assign Policy
      .
    3. Click a device policy.
    4. Click
      Save
      .
    Add devices to a zone.
    You can use zones to manage the application of settings and a device policy to multiple devices. For more information about zones, see the Cylance Endpoint Security Setup content.
    1. Select one or more devices.
    2. Click
      Add to Zones
      .
    3. Select one or more zones.
    4. Click
      Save
      .
    Remove devices.
    When you remove a device, you unregister the
    CylancePROTECT Desktop
    agent and the data for that device is removed from the management console. The user receives a notification that the agent is not registered and they need to provide an installation token to register the agent again.
    1. Select one or more devices.
    2. Click
      Remove
      .
    3. Click
      Yes
      to confirm.
    Include (or exclude) devices in lifecycle management.
    You can configure lifecycle management settings to specify when the state of a device changes from offline to inactive. For more information, see Using device lifecycle management.
    1. Select one or more devices.
    2. Click
      Include In Lifecycle Management
      or
      Exclude From Lifecycle Management
      .
    3. Click
      Yes
      to confirm.
    Reset the inactivity period for devices.
    This feature sets the device state to offline, resets the offline date counter, and sets the offline date to the current date. This does not affect devices that are online.
    1. Select one or more devices.
    2. Click
      Reset inactivity period
      .
    3. Click
      Yes
      to confirm.
    Start a background threat detection scan on a device
    You can start a background threat detection scan for a device on demand. This feature requires devices to be running
    CylancePROTECT Desktop
    agent version 3.2 or later. When you start a background scan with this option, any scan that is currently in progress on a device is terminated before the new scan is started.
    1. Select one or more devices.
    2. Click
      Background scan
      .
    3. Click
      Yes
      to confirm.
    The date and time that the most recent background scan completed is logged in the console. If recurring background threat detection is set in the assigned device policy, the next scheduled scan time is recalculated accordingly.
    Note that if background threat detection scans are running on several VM devices that are from the same VM host at the same time, device performance will be impacted due to resource sharing.