To address the identified challenges in Endpoint Security, ArmourZero created a centralized device monitoring page. Through this centralized device monitoring page, businesses can enhance their endpoint security, improve monitoring and logging capabilities, boost employee cybersecurity awareness, and effectively mitigate risks associated with unauthorized device usage.
In this section, we discuss Device Protection after you have already installed the agent or license on the device. The device name will automatically be shown on this device page upon successful installation.
How to install protection on a company device?
Note: This does not apply if you are subscribing to Email Protection as a service, as the product does not have a unique license key and is not installed on a physical device. The product is entirely based in the cloud.
What to do if your device is not listed on this Devices page?
If the device does not show up on the device section page after installation, follow these steps:
Verify Installation: Double-check that the agent or license was installed correctly on the device. Ensure that you follow the installation instructions provided for your specific product.
Check Compatibility: Ensure that the device is compatible with the product. Some products may have specific requirements, and incompatible devices might not be recognized.
Network Issues: Confirm that the device has a stable internet connection. Poor or no connectivity during installation can lead to unsuccessful registration.
Consult Your Success Manager: If issues persist, get in touch with your Success Manager. They can provide personalized troubleshooting guidance based on the unique features and requirements of the product you've subscribed to.
Why consult your Success Manager?
Tailored Guidance: Your Success Manager is familiar with the intricacies of the product you're using and can offer guidance specific to its functionalities.
Quick Resolution: They can help identify the root cause of the installation issue swiftly, saving you time and frustration.
Product-Specific Knowledge: Different products may have unique installation requirements and potential pitfalls. Your Success Manager can leverage their knowledge to address these specific challenges.
In cloud security, prevention is never enough. Before we delve into prevention, let's ensure that all devices have the necessary protection.
Centralized Device Monitoring Page
To access this page, navigate to Devices > Product Usage Summary.
This page comprises two sections:
Read the use cases page to understand the broad range of scenarios and applications of this platform to make the most of it.
- Identified unknown devices
- Assign particular devices to end users
- Locating specific devices or end-users
- Off-board a device from a certain product
- Reassign license to new devices
- Overly subscribed license
- Uninstall the license from the company device, reducing the overall number of licenses
- Uninstall the license from the company device while maintaining the total number of licenses