Managing Endpoint Protection

Deploying SecureAnywhere to an Endpoint
You can deploy SecureAnywhere to endpoints using a variety of methods, depending on your business requirements and network size. An endpoint can be a Window...
Sun, 26 Jul, 2020 at 1:18 PM
Changing Endpoint Keycodes
             Endpoints must use the Endpoint Protection keycode before they can report into the Management Portal. If there are endpoints in your network t...
Sun, 26 Jul, 2020 at 1:19 PM
Renaming Endpoints
             When you add an endpoint, SecureAnywhere identifies it in the Management Portal by its machine name. You might want to change the machine name...
Sun, 26 Jul, 2020 at 1:20 PM
Searching for Endpoints
             Use this procedure to search for a single endpoint or multiple endpoints through our dynamic and flexible search functionality. This procedure...
Sun, 26 Jul, 2020 at 1:22 PM
Issuing Commands to Endpoints
             From the Management Portal, you can issue commands to individual endpoints or to a group of endpoints. For example, you might want to scan an ...
Sun, 26 Jul, 2020 at 1:29 PM
Managing Endpoint Updates and Other Changes
             This section describes some special circumstances you may encounter when you change hardware and operating systems on endpoints.             ...
Sun, 26 Jul, 2020 at 1:30 PM
Using SecureAnywhere on Endpoints
             On occasion, you may need to access an endpoint to change settings in the SecureAnywhere interface. This might be necessary if you assign an ...
Sun, 26 Jul, 2020 at 1:34 PM
Checking Scan Results and Managing Threats
             From Group Management, you can view the scan history of endpoints and manage any detected threats. You can restore a file from quarantine if y...
Sun, 26 Jul, 2020 at 1:35 PM
Downloading and Forcing Updates
             Unlike previous versions of Webroot software, Webroot SecureAnywhere automatically downloads and installs all updates by default. When we rele...
Sun, 26 Jul, 2020 at 1:37 PM
Forcing Immediate Updates
             The polling interval determines how often the endpoint sends its status and receives commands, for example, every 15 minutes or every hour. If...
Sun, 26 Jul, 2020 at 1:37 PM