Manage Computers

The Endpoint Protection > Computer Management > Manage Computers tab gives you an overview of the computers which have endpoint protection installed for your Sophos UTM. The computers are added to the list automatically. You can assign a computer to a group, add additional information, modify a computer's tamper protection settings, or delete a computer from the list.

To edit the settings of a listed computer proceed as follows:

  1. Click the Edit button of the respective computer.

    The Edit Computer dialog box opens.

  2. Make the following settings:

    Computer group: Select the computer group you want to assign the computer to. The computer will receive the protection settings of the assigned group.

    Type: Select the computer type, i.e. desktop, laptop, or server. The type serves to filter the list.

    Tamper protection: If enabled, modification of the protection settings on the computer locally is only possible with a password. The password is defined on the Advanced tab. If disabled, endpoint users can modify protection settings without password. By default, the setting matches the setting of the group the computer belongs to.

    Inventory # (optional): Enter the inventory number of the computer.

    Comment (optional): Add a description or other information.

  3. Click Save.

    Your settings will be saved.

To delete a computer from the list, click the Delete button.

Note – When you delete a computer from the list it will no longer be monitored by Sophos UTM. However, the installed endpoint software will not automatically be uninstalled, and the policies last deployed will still be active.

© 2019 Sophos Limited Sophos UTM 9.600