Device Config
Important Information Locking a device to a site will no longer automatically organize the device should the IP address change. |
Discovery: Device Config
Agent Emulator |
Allows administrators to simulate multiple endpoint devices within the console environment without requiring actual hardware. This is useful for testing or development purposes. Rather than requiring real hardware endpoints, the emulator generates virtualized agent instances that interact with the backend as if they were real devices. Configuration Options:
|
Agent Password Protection | Protect the Agent from inadvertent uninstall by requiring a password for this action. |
File Sharing |
This setting determines how files are distributed from the console to devices (and vice versa) during workflows, deployments, or tasks. Available Technologies:
|
File Index |
This option allows configuring the files scan process on a device. For the scan process files and folders are indexed and a file database is created on a device.
|
Inventory |
Allows enabling device fingerprints check to prevent identity theft and/or credit card fraud. Assign a GUID to a newly discovered device based on the unique device fingerprint. The Device ID is regenerated after 10 or more hardware changes in the inventory, although the Name of the Device remains the same. We recommend disabling the 'Unique Device Fingerprint' option to avoid device duplicating. |
Performance |
Allows control of how much network bandwidth the Agent is allowed to use:
|
Remote Control |
Configures remote-control session settings.
The possible checkbox values:
By default, Global Device Settings are used for Remote Control. Custom device settings supercede the Global Device Settings. If only one option is changed, the others will be pulled in from the global settings. |
Site Locking |
Locks or unlocks the device to the current site. Devices that are locked to a site will stay assigned to that site even if the IP address of the device changes. |
End User Access |
Enable a security code that will allow this device to be accessed using an HTML5-supported browser without having to open the Absolute console. A unique security code must be entered before the connection is established. To disable this option, delete the code from the text box and click 'Update' |
Blackout Hours |
Enable a start and end time when the device will be protected from accidental task deployments. Hours are taken from the local date and time on the device. Blackout hours assigned to the device cannot be countermanded by a Task override. |