This workflow shows administrators how to investigate the state of the devices, view details of the devices and details of the users using the endpoint. For threat events, refer to Threat Investigation.
To view the list of endpoints and take any actions, navigate to Assets > Devices.
To view the list of devices managed by this instance of SonicWall Capture Client, navigate to Assets > Devices.
At the top of the page, you have the options to:
Columns: Click Columns to select and view the required columns. You can customize the options to display the required columns including Identifier (shows as an identifier or 'tag' assigned to the endpoint), Name (Endpoint name), Status (shows the current state of any updates performed), Health Status (shows as Healthy or Infected. An endpoint shows as infected if it has at least one active threat.), Commissioned, Network Status (Is Disconnect from Network enabled or disabled), Pending Actions, Pending threat reboot (Yes or No), Operational State (If an endpoint was disabled by the customer or by SentinelOne it shows Disabled. Otherwise it shows Not disabled.), Vulnerability Status, Tenant, Last Active (when the Agent last connected to the Management), Current User, Local IP, Console Visible IP (External IP address of the Agent), Location, Domain (Network domain that the endpoint belongs to), Type (Installer type - file used to install the Agent), OS, Network Protection, Client Version, SentinelOne Version, SentinelOne Pending Upgrade, Scan Status (when the last scan was completed), Disk Encryption (On or Off), and Group.
Export as CSV: Click to export and download the devices details to CSV file.
Taking appropriate actions for devices: Select the device from the list and click to take appropriate actions. You can take any of the following:
On clicking any of the devices, the Overview tab shows details of the device including the machine name, IP address, the operating system (OS) in which it is running, the licenses that are attached to this device and the users logged into this device the last time.
To collect information for troubleshooting or to manage state of the device, click and select:
View Threats
Update Policy to update the Endpoint Policy assigned to the user.
Upgrade Client
Refresh Active Directory Info
Send Logs
Enable Debug Logs
Archive Logs
Initiate Scan
Send TSR (to pull specific data from the endpoint for investigation purposes)
Disconnect Network
Decommission to decommission Capture Client and remove it from console
Uninstall Client to uninstall Capture Client from the endpoint
Show Authorization Password
Shutdown Device
Reboot Device
Reset Authorization Password
The key data points to be observed here are the three icons in the Overview tab that represent the state of the endpoint. The green colored icons represent a healthy state while gray icon indicates that there is a problem with that device.
Icon | Meaning |
---|---|
![]() |
Green if network is connected. Red if network is disconnected. Grey if network status is unavailable. Orange if network is reconnecting. |
![]() |
Green if SentinelOne agent is online. Grey if SentinelOne agent is Offline. Yellow if SentinelOne is in 'Pending upgrade' or 'Pending uninstall' state. Red if SentinelOne has a pending action. For more details, refer to SentinelOne Pending Actions. |
![]() |
Green if Capture Client on the endpoint is online. Grey if Capture Client on the endpoint is offline. |
Activated—This state means that the device on which Capture Client is running is connected to the network and can access the network.
Possible Problem—The Capture Client or any of its modules needs an upgrade to the most current version. The device is unavailable when the icon is red and pending connecting information when gray.
Resolution—Navigate to Policies > Client for the package and roll out the latest version of the package.
Online—This state means that this device is up and running and is communicating with the Cloud Management Console.
Even if the device is offline, the device is still protected.
Capture Client also obtains the list of processes running on an endpoint at any given time. Knowing what processes are running can be useful in malware incident investigations. It also helps you to know if a dubious application or process is being run on the endpoint. Navigate to Assets > Devices to see the entire list of processes running on that endpoint. Select a device and click on the Process tab. You can also search for specific processes by name or filter the list if you are looking for a specific process.
You can easily build bulk exclusions from the Processes tab of any device. Simply select the process or set of processes and then click . This icon is to Adds paths to exclusions. You can even search for processes belonging to a specific application or vendor (for example, Apple or Adobe) and exclude all their applications.
You can also de-list processes on the Processes tab (remove them from the Exclusions list). Those processes that are already excluded are identified by a gray checked shield at the end of the name. Select all those processes that you want to de-list, and click . This icon Removes paths from exclusions.
Click to refresh data.
Click on Assets > Devices. Double-click on the desired device in the table to see the device detail. Select the Policies tab to view the policies assigned to the user who was logged into this device. This can be helpful in investigating if a policy issue may be causing problems with a specific endpoint. From this section, you can also navigate to editing the Capture Client policy or the child Threat Protection and Trusted Certificates policies.
Scroll down and click on the Details button to view the Policy Priority window. You can manually modify the policies assigned to a particular user. Refer to Capture Client Policies for more information.