Security Management - Legacy UI

BEFORE YOU BEGIN  To be able to see the Security Management page, you will need to configure the Webroot Endpoint Security Integration. For further information, refer to Webroot Endpoint Security Integration - Legacy UI.

About Security Management

Security management allows you to report on your device estate protected by Webroot. It allows you to see information and statistics about the current status of your devices and recently detected threats. The Security Management page becomes available once you have downloaded and configured the Webroot Endpoint Security Integration. For more information, refer to Webroot Endpoint Security Integration - Legacy UI.

Security management is available at account and site level. Navigate to:

  • Account > Manage > click the radio button for Security Management or
  • Sites > select a site > Manage > click the radio button for Security Management

You will see the following information on the page:

Field Description
All devices / Servers / Workstations A pie chart showing the status of All devices / Servers / Workstations secured by the security product.
Select one of the radio buttons to see the required device type and hover over the chart to see the number and status of the devices. Percentage numbers are also displayed in parentheses.

NOTE  Click a piece in the pie chart to see statistics about those devices in the Active threats in the last 30 days chart.

Active threats in the last 30 days A chart showing the number of active threats, detected threats, and blocked threats on your devices in the last 30 days. Hover over a date to see the exact number.

NOTE  Select the required device type (All devices / Servers / Workstations) above the pie chart to see statistics about that device type only.

NOTE  To learn about other management options, refer to Manage your endpoints - Legacy UI.

NOTE  For information about security management policies, refer to Create a Security Management policy - Legacy UI.