Description
This guide will go over the Devices tab in the ConcealBrowse dashboard and explain what it holds and what options are available to you.
Procedure
- In your web browser navigate to https://dashboard.conceal.io/ and login if necessary.
- On the left side menu, click the tab labeled Devices. Here you will see a list of all registered devices. You can toggle between tile and list view on the righthand side.
- List View: Displays Device data as list with row for each device
- Grid View: Displays Device data as an alternative view with a tile for each Device - Search Devices by Machine ID, Host, User or Asset ID
- The first column allows you to select devices to take action on, more on those actions in Step 9 below.
-
The Device column holds the identifying attributes for the devices. Click the dropdown arrow to see all device labels, the HostID is displayed by default.
Host ID This is the host ID for the device as defined in the host OS. User ID This is the user ID for the user logged into the device at time of device registration. Asset ID This the asset ID for the device as defined in the host OS. Machine ID This is Conceal's unique identifier for the device assigned at device registration. - The Profile Count column shows how many profiles belong to that device, and how many are enabled. This column is color coded based on the amount of profiles enabled/disabled.
- Green: All profiles are enabled
- Yellow: Some, but not all profiles are disabled
- Red: All profiles for that device are disabled -
Click into the Profile Count to show more details on the device:
Browser Browser common name Extension Version Version number of ConcealBrowse Extension for the Device Profile Last Checkin Time stamp for last checkin of the Device Profile. Note that Checkins occur only when using the corresponding browser profile Created At Time stamp for when the Device Profile first registered with the Conceal service. Enabled Toggle to enable/disable the Device Profile - Click the 3 dots on the right to bring up additional options for that device profile:
Activity Summary Displays Activity Summary report for the Device Profile. Includes Last Checkin, URLs Scanned count and Isolated Sessions Count (see Activity Summary Report for more information) Checkins Displays Desktop Clients Report for the Device Profile. Includes ConcealBrowse version, host OS, Browser (with version) and Last Checkin (see Desktop Clients Report for more information) Interventions Displays Interventions Report for the Device Profile. Includes URL, count URL has isolated (cumulative for Device Profile) Action (Isolate, Block, Redirect), Time, Detected By (Conceal detection engine), Score (risk %), Threat Tag, Add Access Policy button (see Interventions Report for more information) Isolated Sessions Displays list of Isolated Sessions for the Device Profile. Note user must enter isolation to appear on this report. Includes URL and Time stamp for isolation session entry (see Isolated Sessions Report for more details) Delete Delete Device Profile. Note that the corresponding browser profile should be uninstalled before deleting Device Profiles from the dashboard or the Device(s) will re-register the Device Profile(s) with the Conceal Service. Deleting Device Profiles permanently removes all Device Profile data including detection data - if data retention is desired, do not delete the Device Profile or export Device Profile data prior to deletion. - The Last Profile Check In column reflects the most recent check-in date for any profile on the device.
-
Click the 3 dots on the right to bring up the option to disable or enable device and profiles, or delete the device and profiles. You can use the select boxes on the left to select all devices or some devices to take action on.
- Click the Actions button to take different device actions explained below:
Register Device Displays Company ID and Site ID parameters required for device registration during installation. Export devices Downloads a .csv file with Device information Enable All Devices Enables protection/intervention on all Devices and Device Profiles Disable All Devices Disables protection/intervention on all Devices and Device Profiles so that the extension will not intervene (block, isolate). This is recommended to immediately mitigate issues with the ConcealBrowse extension that prevent users from completing critical workflows and is preferred over uninstalling the extension. Note: Disable and Enable devices should take effect immediately without need to force a sync on the ConcealBrowse extension. Enable Selected Devices Enables protection/intervention for all selected Devices and corresponding Device Profiles Disable Selected Devices Disables protection/intervention on all selected Devices and Device Profiles so that the extension will not intervene (block, isolate). This is recommended to immediately mitigate issues with the ConcealBrowse extension that prevent users from completing critical workflows Delete Selected Devices Deletes selected Devices from the Devices dashboard. Note that the ConcealBrowse extension should be uninstalled before deleting Devices from the dashboard or the Device will re-register with the Conceal Service. Deleting Devices permanently removes all Device data including intervention data - if data retention is desired, do not delete the Device or export data prior to Device deletion. Delete All Devices Deletes all Devices from the Devices dashboard. Note that the ConcealBrowse extension should be uninstalled before deleting Devices from the dashboard or the Device(s) will re-register with the Conceal Service. Deleting Devices permanently removes all Device data including detection data - if data retention is desired, do not delete the Device or export Device data prior to deletion.
*Never hesitate to contact your Customer Success Manager for any questions or concerns. You may also open a support ticket at support.conceal.io by scrolling to the bottom and clicking Submit a request.
Related to:
0
0
Was this article helpful?
0 out of 0 found this helpful
Articles in this section
- Allow policies to consider when starting with ConcealBrowse
- Content Blocking with ConcealBrowse
- Early Access Program Enrollment
- How to implement policies in the ConcealBrowse dashboard
- Managing ConcealBrowse Extension settings as an administrator
- Managing Users in the ConcealBrowse dashboard
- Multi-Factor Authentication with ConcealBrowse
- Navigating the Audit section of the ConcealBrowse dashboard
- Navigating the ConcealBrowse Dashboard section
- Navigating the Devices section of the ConcealBrowse dashboard