Devices Page: Overview

Introduction

The Devices page lists every device in your organization with the endpoint agent installed. Once the page in enabled, it's accessible in the sidebar's Cyber Risk section.  From here, you can view key details about each device, along with the risk level Field Effect MDR attributed to each device. You can search, sort, and filter this page to suit your needs, as well as drill into a device for more information.


Partners: This page may behave differently depending on the view that the Organization Selector is set to. 

When set to the Partner view, this page will show all endpoints for every client organization you manage.

When set to a specific Client view, this page will display only endpoints for the selected client organization.


Table of contents


Enabling the Page

Navigate to the Data Management page and click the Synchronize Endpoint Device Data toggle in the Endpoint Devices section.



Once the toggle is enabled, the Devices page will be listed in the sidebar.


Once enabled, the page is immediately accessible via the sidebar. But it may take up to 1-3 hours to sync all endpoint data to the page.



Disabling the Page

To disable the Devices page, navigate back to the Data Management page and disable the Synchronize Endpoint Device Data toggle. 


You will be asked to confirm your choice. Click Disable to confirm, and the page will no longer be listed in the sidebar.



Overview of the Devices page

If a device’s details are changed (Hostname, IP address, etc.), it may take up to 30 minutes before it is reflected on this page. After making changes that impact a device’s risk level, it may take up to 8 hours to reflect a change in risk level.



This page displays the following columns:


Data Point

Examples

Status 

(Icon) online/offline

Core OS 

(Icon) Windows/Linux/macOS

Risk Level

Critical, High, Medium, Normal, Unknown

Hostname

“User X’s PC”, “Server 1”, “PN08574NHS”

IP Address

123.123.123.12

Last Connected IP 

123.123.123.12

Last User

User X, User Y, User Z

Operating System 

Windows 10, Debian, iOS 15, Red Hat

OS Version

8, 9, 10, 10.1

Hardware Vendor

Dell, Apple

Hardware Model

Latitude 7400, MacBook Pro

First Seen

30 minutes ago, 10 July 2021

Last Seen

30 minutes ago, 10 July 2021

Agent Version

3.0.5.3748

CPU Architecture

X64

Serial Number

123123456456


Bulk Editing

Some of our features, specifically Active Response and Agent Protection, are applied at a global level. This means that once these features are enabled and configured, they are applied to every endpoint in your organization. 


While this approach helps ensure that your entire fleet is protected as soon as the feature is enabled, scenarios may arise that require you to disable or modify a feature for only a specific set of endpoints.  to learn how to bulk edit endpoint devices, see our Help Center article on Bulk Editing



Drilling into an Endpoint Device

Double click an endpoint device in the page’s table to drill in for more details.



The device's details pane will open on the right. It has two sections: General Details (1) and Risks & Vulnerabilities (2). 



General Details

The General Details area reiterates the information shown in the table to the left of the drilled in view. See the table above to learn more about each data point. 



Risks and Vulnerabilities

If a device has any risks or vulnerabilities associated with it, they will be listed in the Risks and Vulnerabilities section, and you can sort and filter this section.



Vulnerability Structure

Several elements make up a vulnerability:

  • Title and Body: the Title includes the name of risk or vulnerability, along with its color-coded risk level indicator, and the body includes high-level information.  
  • CVE Details: this area includes a link to the NVD CVE record (ex: CVE-2020-3361) and a vulnerability rating, which is also based on the NVD CVE.
  • Body: details about the vulnerability and any other links to the NVD CVE record and CVSS rating (if available).
  • Insights: insights include useful information that may help you address the issue or investigate further.  





Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article